Vulnerabilites related to Siemens - SIMATIC Field PG M5
var-202202-0007
Vulnerability from variot

A vulnerability exists in System Management Interrupt (SWSMI) handler of InsydeH2O UEFI Firmware code located in SWSMI handler that dereferences gRT (EFI_RUNTIME_SERVICES) pointer to call a GetVariable service, which is located outside of SMRAM. This can result in code execution in SMM (escalating privilege from ring 0 to ring -2). The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count

SMM Privilege Escalation 10

SMM Memory Corruption 12

DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. InsydeH2O UEFI There is an unspecified vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0007",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc377g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc647e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 1,
            vendor: "insyde",
            version: "5.34.03.0029",
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 1,
            vendor: "insyde",
            version: "5.33.15.0034",
         },
         {
            model: "simatic ipc627e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc847e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc677e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc227g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 1,
            vendor: "insyde",
            version: "5.23.04.0045",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc327g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "ruggedcom ape1808",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc127e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 1,
            vendor: "insyde",
            version: "5.42.03.0010",
         },
         {
            model: "simatic ipc277g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc477e pro",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 1,
            vendor: "insyde",
            version: "5.23.45.0023",
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 1,
            vendor: "insyde",
            version: "5.12.09.0074",
         },
         {
            model: "insydeh2o",
            scope: null,
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
         {
            db: "NVD",
            id: "CVE-2020-5953",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:5.12.09.0074:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:5.23.04.0045:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:5.23.45.0023:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:5.33.15.0034:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:5.34.03.0029:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:5.42.03.0010:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:ruggedcom_ape1808_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:ruggedcom_ape1808:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc127e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc227g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc277g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc327g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc377g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-5953",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This document was written by Vijay Sarvepalli.Statement Date:   March 01, 2022",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2020-5953",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 6.9,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.4,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:M/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 6.9,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2020-5953",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:M/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.8,
                  impactScore: 6,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "High",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-5953",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Changed",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-5953",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202202-121",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
         {
            db: "NVD",
            id: "CVE-2020-5953",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-121",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability exists in System Management Interrupt (SWSMI) handler of InsydeH2O UEFI Firmware code located in SWSMI handler that dereferences gRT (EFI_RUNTIME_SERVICES) pointer to call a GetVariable service, which is located outside of SMRAM. This can result in code execution in SMM (escalating privilege from ring 0 to ring -2). The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count \n\n\n\n\nSMM Privilege Escalation 10 \n\n\n SMM Memory Corruption  12 \n\n\n DXE Memory Corruption 1CVE-2020-27339 Affected\nCVE-2020-5953 Affected\nCVE-2021-33625 Affected\nCVE-2021-33626 Affected\nCVE-2021-33627 Affected\nCVE-2021-41837 Affected\nCVE-2021-41838 Affected\nCVE-2021-41839 Affected\nCVE-2021-41840 Affected\nCVE-2021-41841 Affected\nCVE-2021-42059 Affected\nCVE-2021-42060 Not Affected\nCVE-2021-42113 Affected\nCVE-2021-42554 Affected\nCVE-2021-43323 Affected\nCVE-2021-43522 Affected\nCVE-2021-43615 Not Affected\nCVE-2021-45969 Not Affected\nCVE-2021-45970 Not Affected\nCVE-2021-45971 Not Affected\nCVE-2022-24030 Not Affected\nCVE-2022-24031 Not Affected\nCVE-2022-24069 Not Affected\nCVE-2022-28806 Unknown. InsydeH2O UEFI There is an unspecified vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-5953",
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-5953",
            trust: 4,
         },
         {
            db: "SIEMENS",
            id: "SSA-306654",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97136454",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001342",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2022020305",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-73436",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-121",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
         {
            db: "NVD",
            id: "CVE-2020-5953",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-121",
         },
      ],
   },
   id: "VAR-202202-0007",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2023-12-18T10:51:42.667000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INSYDE-SA-2022017",
            trust: 0.8,
            url: "https://www.insyde.com/products",
         },
         {
            title: "Insyde InsydeH2O Security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=180215",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-121",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
         {
            problemtype: "Lack of information (CWE-noinfo) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
         {
            db: "NVD",
            id: "CVE-2020-5953",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
         },
         {
            trust: 1.6,
            url: "https://security.netapp.com/advisory/ntap-20220222-0005/",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/products",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-5953",
         },
         {
            trust: 0.8,
            url: "cve-2020-27339  ",
         },
         {
            trust: 0.8,
            url: "cve-2020-5953  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33625  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33626  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33627  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41837  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41838  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41839  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41840  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41841  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42059  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42060  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42113  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42554  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43323  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43522  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43615  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45969  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45970  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45971  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24030  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24031  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24069  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-28806  ",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu97136454/index.html",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/independent-bios-developers-multiple-vulnerabilities-via-uefi-37438",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-73436",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022020305",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
         {
            db: "NVD",
            id: "CVE-2020-5953",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-121",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
         {
            db: "NVD",
            id: "CVE-2020-5953",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-121",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-01T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
         {
            date: "2022-02-03T01:15:07.647000",
            db: "NVD",
            id: "CVE-2020-5953",
         },
         {
            date: "2022-02-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-121",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-28T07:09:00",
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
         {
            date: "2022-04-12T18:17:18.710000",
            db: "NVD",
            id: "CVE-2020-5953",
         },
         {
            date: "2022-03-10T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-121",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-121",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-121",
         },
      ],
      trust: 0.6,
   },
}

var-202011-1361
Vulnerability from variot

Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel(R) There are unspecified vulnerabilities in processor products.Information may be obtained. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

===================================================================== Red Hat Security Advisory

Synopsis: Moderate: microcode_ctl security, bug fix and enhancement update Advisory ID: RHSA-2020:5183-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:5183 Issue date: 2020-11-23 CVE Names: CVE-2020-8695 CVE-2020-8696 CVE-2020-8698 =====================================================================

  1. Summary:

An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Server AUS (v. 7.3) - x86_64 Red Hat Enterprise Linux Server E4S (v. 7.3) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.3) - x86_64

  1. Description:

The microcode_ctl packages provide microcode updates for Intel.

Security Fix(es):

  • hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)

  • hw: Vector Register Leakage-Active (CVE-2020-8696)

  • hw: Fast forward store predictor (CVE-2020-8698)

Bug Fix(es) and Enhancement(s):

  • Update Intel CPU microcode to microcode-20201112 release, addresses:
  • Addition of 06-55-0b/0xbf (CPX-SP A1) microcode at revision 0x700001e;
  • Addition of 06-8a-01/0x10 (LKF B2/B3) microcode at revision 0x28;
  • Addition of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode at revision 0x68;
  • Addition of 06-a5-02/0x20 (CML-H R1) microcode at revision 0xe0;
  • Addition of 06-a5-03/0x22 (CML-S 6+2 G1) microcode at revision 0xe0;
  • Addition of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode at revision 0xe0;
  • Addition of 06-a6-01/0x80 (CML-U 6+2 v2 K0) microcode at revision 0xe0;
  • Update of 06-4e-03/0xc0 (SKL-U/U 2+3e/Y D0/K1) microcode (in intel-06-4e-03/intel-ucode/06-4e-03) from revision 0xdc up to 0xe2;
  • Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006906 up to 0x2006a08;
  • Update of 06-5e-03/0x36 (SKL-H/S/Xeon E3 N0/R0/S0) microcode (in intel-06-5e-03/intel-ucode/06-5e-03) from revision 0xdc up to 0xe2;
  • Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up to 0xde;
  • Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up to 0xde;
  • Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xd6 up to 0xe0;
  • Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xd6 up to 0xde;
  • Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from revision 0xd6 up to 0xde;
  • Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xd6 up to 0xde;
  • Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xd6 up to 0xde;
  • Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xd6 up to 0xde;
  • Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xd6 up to 0xde;
  • Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xd6 up to 0xde;
  • Update of 06-3f-02/0x6f (HSX-E/EN/EP/EP 4S C0/C1/M1/R2) microcode from revision 0x43 up to 0x44;
  • Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000157 up to 0x1000159;
  • Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4002f01 up to 0x4003003;
  • Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision 0x5002f01 up to 0x5003003;
  • Update of 06-5c-09/0x03 (APL D0) microcode from revision 0x38 up to 0x40;
  • Update of 06-5c-0a/0x03 (APL B1/F1) microcode from revision 0x16 up to 0x1e;
  • Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x32 up to 0x34;
  • Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x16 up to 0x18;
  • Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x78 up to 0xa0;
  • Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xca up to 0xe0.

  • Disable 06-8c-01 (TGL-UP3/UP4 B1) microcode update by default.

  • Add README file to the documentation directory.

  • Add publicly-sourced codenames list to supply to gen_provides.sh; update the latter to handle the somewhat different format.

  • Add SUMMARY.intel-ucode file

  • Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1828583 - CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface 1890355 - CVE-2020-8696 hw: Vector Register Leakage-Active 1890356 - CVE-2020-8698 hw: Fast forward store predictor

  1. Package List:

Red Hat Enterprise Linux Server AUS (v. 7.3):

Source: microcode_ctl-2.1-16.37.el7_3.src.rpm

x86_64: microcode_ctl-2.1-16.37.el7_3.x86_64.rpm microcode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm

Red Hat Enterprise Linux Server E4S (v. 7.3):

Source: microcode_ctl-2.1-16.37.el7_3.src.rpm

x86_64: microcode_ctl-2.1-16.37.el7_3.x86_64.rpm microcode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm

Red Hat Enterprise Linux Server TUS (v. 7.3):

Source: microcode_ctl-2.1-16.37.el7_3.src.rpm

x86_64: microcode_ctl-2.1-16.37.el7_3.x86_64.rpm microcode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2020-8695 https://access.redhat.com/security/cve/CVE-2020-8696 https://access.redhat.com/security/cve/CVE-2020-8698 https://access.redhat.com/security/updates/classification/#moderate

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBX7v1LtzjgjWX9erEAQhhzBAAi0jG7U8W+Dm2A/Nq40aoLyRcGknttkV1 0wwy62OR4KUnqiP0gHB8Sjh6UpAPqhLNExc2+B8RyUB23yUe8/PRB1fUqpmf5150 mzwiORZfu572ao7GLskdc4SUydVSqY9QuTK7mTm+HGmOm2XQpics51xWjyfKM/TN 5lrrd3DXxTrXwsjva2tPJcCp9A1s3XAVjK16Fu+FcKvXsgxruUy41YxJMsY8Mxfj pPRzcXdMvPQYhvyv8y1KY2Mz5WMKdpOK83X6Y9iYL6d0g2UT1d3cw8AOHc6GYNFS MhLDUASoII2A4xWkXCOyaocrg58QFctEHGfnxwTU5ZGq/vfOduUSLE881thD+tqD qgQBaz0cp0tNr+nYXvhtyX9XE4ve/lszq5BxqnNF0xi9hP8T5DwZzXnhtZ+aZML2 3WlT3tqgkDE7hZqyqSG8Vd9ZLzVkjmnw7+tqRjIGvzN9eKQxLXg/fPkKeHGh+HOz y0zCBHlZKrKtz0lQHP48W9t6l0Rkh19hW1fIA46rW4C7erDcW78nBMJ2cTAxbBk1 ITTGOIHpUgn3882xKM/yAHUMK25Xkh2va/e8UpafYEazSM4H9T15N87UyCVneKdD s2N1tYHegx85eoOlt24Bw2RBPFHhFGWOtE0McQ09kyDKFyGJXUMqzPhBUvvJz8mE G3KPuKrDU0U= =Vap7 -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================== Ubuntu Security Notice USN-4628-2 November 12, 2020

intel-microcode regression

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 20.10
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 ESM

Summary:

USN-4628-1 introduced a regression in the Intel Microcode for some processors. Unfortunately, that update prevented certain processors in the Intel Tiger Lake family from booting successfully. This update reverts the microcode update for the Tiger Lake processor family.

Please note that the 'dis_ucode_ldr' kernel command line option can be added in the boot menu to disable microcode loading for system recovery.

We apologize for the inconvenience.

Original advisory details:

Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine Easdon, Claudio Canella, and Daniel Gruss discovered that the Intel Running Average Power Limit (RAPL) feature of some Intel processors allowed a side- channel attack based on power consumption measurements. A local attacker could possibly use this to expose sensitive information. (CVE-2020-8695)

Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that some Intel(R) Processors did not properly remove sensitive information before storage or transfer in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2020-8696)

Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that some Intel(R) Processors did not properly isolate shared resources in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2020-8698)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 20.10: intel-microcode 3.20201110.0ubuntu0.20.10.2

Ubuntu 20.04 LTS: intel-microcode 3.20201110.0ubuntu0.20.04.2

Ubuntu 18.04 LTS: intel-microcode 3.20201110.0ubuntu0.18.04.2

Ubuntu 16.04 LTS: intel-microcode 3.20201110.0ubuntu0.16.04.2

Ubuntu 14.04 ESM: intel-microcode 3.20201110.0ubuntu0.14.04.2

After a standard system update you need to reboot your computer to make all the necessary changes

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1361",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic ipc477e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.15",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1,
            vendor: "debian",
            version: "9.0",
         },
         {
            model: "hci storage node bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "clustered data ontap",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "simatic ipc647e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "simatic itp1000",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "23.01.08",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "31",
         },
         {
            model: "simatic field pg m5",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "22.01.08",
         },
         {
            model: "hci compute node bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "simatic ipc847e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "simatic ipc477e pro",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.15",
         },
         {
            model: "simatic ipc677e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "simatic ipc427e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.15",
         },
         {
            model: "solidfire bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "simatic ipc627e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "microcode",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "hci compute node bios",
            scope: null,
            trust: 0.8,
            vendor: "netapp",
            version: null,
         },
         {
            model: "fedora",
            scope: null,
            trust: 0.8,
            vendor: "fedora",
            version: null,
         },
         {
            model: "solidfire bios",
            scope: null,
            trust: 0.8,
            vendor: "netapp",
            version: null,
         },
         {
            model: "gnu/linux",
            scope: null,
            trust: 0.8,
            vendor: "debian",
            version: null,
         },
         {
            model: "clustered data ontap",
            scope: null,
            trust: 0.8,
            vendor: "netapp",
            version: null,
         },
         {
            model: "microcode",
            scope: null,
            trust: 0.8,
            vendor: "インテル",
            version: null,
         },
         {
            model: "hci storage node bios",
            scope: null,
            trust: 0.8,
            vendor: "netapp",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            db: "NVD",
            id: "CVE-2020-8698",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:microcode:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:microcode:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netapp:solidfire:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:netapp:solidfire:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "22.01.08",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "22.01.08",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "21.01.15",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "21.01.15",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "21.01.15",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "21.01.15",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "21.01.15",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "21.01.15",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.08",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.08",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.08",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.08",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.08",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.08",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.08",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.08",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "23.01.08",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "23.01.08",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-8698",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Ubuntu",
      sources: [
         {
            db: "PACKETSTORM",
            id: "160018",
         },
         {
            db: "PACKETSTORM",
            id: "160035",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2020-8698",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 2.1,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "CVE-2020-8698",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "LOW",
                  trust: 1.9,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2020-8698",
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5.5,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-8698",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "Low",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-8698",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201911-1657",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-8698",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8698",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
         {
            db: "NVD",
            id: "CVE-2020-8698",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel(R) There are unspecified vulnerabilities in processor products.Information may be obtained. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Moderate: microcode_ctl security, bug fix and enhancement update\nAdvisory ID:       RHSA-2020:5183-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2020:5183\nIssue date:        2020-11-23\nCVE Names:         CVE-2020-8695 CVE-2020-8696 CVE-2020-8698 \n=====================================================================\n\n1. Summary:\n\nAn update for microcode_ctl is now available for Red Hat Enterprise Linux\n7.3 Advanced Update Support. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Server AUS (v. 7.3) - x86_64\nRed Hat Enterprise Linux Server E4S (v. 7.3) - x86_64\nRed Hat Enterprise Linux Server TUS (v. 7.3) - x86_64\n\n3. Description:\n\nThe microcode_ctl packages provide microcode updates for Intel. \n\nSecurity Fix(es):\n\n* hw: Information disclosure issue in Intel SGX via RAPL interface\n(CVE-2020-8695)\n\n* hw: Vector Register Leakage-Active (CVE-2020-8696)\n\n* hw: Fast forward store predictor (CVE-2020-8698)\n\nBug Fix(es) and Enhancement(s):\n\n* Update Intel CPU microcode to microcode-20201112 release, addresses:\n  - Addition of 06-55-0b/0xbf (CPX-SP A1) microcode at revision 0x700001e;\n  - Addition of 06-8a-01/0x10 (LKF B2/B3) microcode at revision 0x28;\n  - Addition of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode at revision 0x68;\n  - Addition of 06-a5-02/0x20 (CML-H R1) microcode at revision 0xe0;\n  - Addition of 06-a5-03/0x22 (CML-S 6+2 G1) microcode at revision 0xe0;\n  - Addition of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode at revision 0xe0;\n  - Addition of 06-a6-01/0x80 (CML-U 6+2 v2 K0) microcode at revision\n    0xe0;\n  - Update of 06-4e-03/0xc0 (SKL-U/U 2+3e/Y D0/K1) microcode (in\n    intel-06-4e-03/intel-ucode/06-4e-03) from revision 0xdc up to 0xe2;\n  - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in\n    intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006906 up\n    to 0x2006a08;\n  - Update of 06-5e-03/0x36 (SKL-H/S/Xeon E3 N0/R0/S0) microcode (in\n    intel-06-5e-03/intel-ucode/06-5e-03) from revision 0xdc up to 0xe2;\n  - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xd6 up\n    to 0xe0;\n  - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0)\n    microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from\n    revision 0xd6 up to 0xde;\n  - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-3f-02/0x6f (HSX-E/EN/EP/EP 4S C0/C1/M1/R2) microcode\n    from revision 0x43 up to 0x44;\n  - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000157\n    up to 0x1000159;\n  - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4002f01\n    up to 0x4003003;\n  - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision\n    0x5002f01 up to 0x5003003;\n  - Update of 06-5c-09/0x03 (APL D0) microcode from revision 0x38 up\n    to 0x40;\n  - Update of 06-5c-0a/0x03 (APL B1/F1) microcode from revision 0x16 up\n    to 0x1e;\n  - Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x32 up\n    to 0x34;\n  - Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x16 up\n    to 0x18;\n  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x78\n    up to 0xa0;\n  - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xca\n    up to 0xe0. \n\n* Disable 06-8c-01 (TGL-UP3/UP4 B1) microcode update by default. \n\n* Add README file to the documentation directory. \n\n* Add publicly-sourced codenames list to supply to gen_provides.sh; update\n  the latter to handle the somewhat different format. \n\n* Add SUMMARY.intel-ucode file\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1828583 - CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface\n1890355 - CVE-2020-8696 hw: Vector Register Leakage-Active\n1890356 - CVE-2020-8698 hw: Fast forward store predictor\n\n6. Package List:\n\nRed Hat Enterprise Linux Server AUS (v. 7.3):\n\nSource:\nmicrocode_ctl-2.1-16.37.el7_3.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-16.37.el7_3.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm\n\nRed Hat Enterprise Linux Server E4S (v. 7.3):\n\nSource:\nmicrocode_ctl-2.1-16.37.el7_3.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-16.37.el7_3.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm\n\nRed Hat Enterprise Linux Server TUS (v. 7.3):\n\nSource:\nmicrocode_ctl-2.1-16.37.el7_3.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-16.37.el7_3.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-8695\nhttps://access.redhat.com/security/cve/CVE-2020-8696\nhttps://access.redhat.com/security/cve/CVE-2020-8698\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2020 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nG3KPuKrDU0U=\n=Vap7\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. ==========================================================================\nUbuntu Security Notice USN-4628-2\nNovember 12, 2020\n\nintel-microcode regression\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 20.10\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 ESM\n\nSummary:\n\nUSN-4628-1 introduced a regression in the Intel Microcode for some processors. Unfortunately,\nthat update prevented certain processors in the Intel Tiger Lake family\nfrom booting successfully. This update reverts the microcode update for\nthe Tiger Lake processor family. \n\nPlease note that the 'dis_ucode_ldr' kernel command line option can be\nadded in the boot menu to disable microcode loading for system recovery. \n\nWe apologize for the inconvenience. \n\nOriginal advisory details:\n\n Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine\n Easdon, Claudio Canella, and Daniel Gruss discovered that the Intel Running\n Average Power Limit (RAPL) feature of some Intel processors allowed a side-\n channel attack based on power consumption measurements. A local attacker\n could possibly use this to expose sensitive information. (CVE-2020-8695)\n \n Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that\n some Intel(R) Processors did not properly remove sensitive information\n before storage or transfer in some situations. A local attacker could\n possibly use this to expose sensitive information. (CVE-2020-8696)\n \n Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that\n some Intel(R) Processors did not properly isolate shared resources in some\n situations. A local attacker could possibly use this to expose sensitive\n information. (CVE-2020-8698)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 20.10:\n  intel-microcode                 3.20201110.0ubuntu0.20.10.2\n\nUbuntu 20.04 LTS:\n  intel-microcode                 3.20201110.0ubuntu0.20.04.2\n\nUbuntu 18.04 LTS:\n  intel-microcode                 3.20201110.0ubuntu0.18.04.2\n\nUbuntu 16.04 LTS:\n  intel-microcode                 3.20201110.0ubuntu0.16.04.2\n\nUbuntu 14.04 ESM:\n  intel-microcode                 3.20201110.0ubuntu0.14.04.2\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-8698",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8698",
         },
         {
            db: "PACKETSTORM",
            id: "163924",
         },
         {
            db: "PACKETSTORM",
            id: "163954",
         },
         {
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            db: "PACKETSTORM",
            id: "160191",
         },
         {
            db: "PACKETSTORM",
            id: "160018",
         },
         {
            db: "PACKETSTORM",
            id: "160188",
         },
         {
            db: "PACKETSTORM",
            id: "160035",
         },
      ],
      trust: 2.43,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-8698",
            trust: 3.3,
         },
         {
            db: "SIEMENS",
            id: "SSA-678983",
            trust: 1.7,
         },
         {
            db: "JVN",
            id: "JVNVU91051134",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
            trust: 0.8,
         },
         {
            db: "ICS CERT",
            id: "ICSA-22-132-05",
            trust: 0.7,
         },
         {
            db: "PACKETSTORM",
            id: "163772",
            trust: 0.7,
         },
         {
            db: "PACKETSTORM",
            id: "160018",
            trust: 0.7,
         },
         {
            db: "PACKETSTORM",
            id: "160035",
            trust: 0.7,
         },
         {
            db: "PACKETSTORM",
            id: "163993",
            trust: 0.6,
         },
         {
            db: "PACKETSTORM",
            id: "163863",
            trust: 0.6,
         },
         {
            db: "PACKETSTORM",
            id: "162588",
            trust: 0.6,
         },
         {
            db: "PACKETSTORM",
            id: "160187",
            trust: 0.6,
         },
         {
            db: "PACKETSTORM",
            id: "163757",
            trust: 0.6,
         },
         {
            db: "PACKETSTORM",
            id: "160407",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.2604",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.2905",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.4124",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.4327",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.2797",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.0423",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.2721",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.4017",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2022.2355",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.4200",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.1664",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.2945",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.3959",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.4153",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.4033",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.2672",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021083127",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021081125",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021080915",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021081834",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-49266",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1657",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2020-8698",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "163924",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "163954",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "163758",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "160191",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "160188",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8698",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            db: "PACKETSTORM",
            id: "163924",
         },
         {
            db: "PACKETSTORM",
            id: "163954",
         },
         {
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            db: "PACKETSTORM",
            id: "160191",
         },
         {
            db: "PACKETSTORM",
            id: "160018",
         },
         {
            db: "PACKETSTORM",
            id: "160188",
         },
         {
            db: "PACKETSTORM",
            id: "160035",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
         {
            db: "NVD",
            id: "CVE-2020-8698",
         },
      ],
   },
   id: "VAR-202011-1361",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5185185333333333,
   },
   last_update_date: "2023-11-07T21:08:28.118000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "NTAP-20201113-0006 Intel Intel Product Security Center",
            trust: 0.8,
            url: "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html",
         },
         {
            title: "Intel Processors Fixes for access control error vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=135724",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205185 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205184 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205189 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205181 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix, and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205083 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix, and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205084 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix, and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205190 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205182 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205183 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205369 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205085 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205188 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205186 - security advisory",
         },
         {
            title: "Arch Linux Issues: ",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=cve-2020-8698 log",
         },
         {
            title: "Arch Linux Advisories: [ASA-202102-34] intel-ucode: information disclosure",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=asa-202102-34",
         },
         {
            title: "Citrix Security Bulletins: Citrix Hypervisor Security Update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=0196318f80fa91831e1ad927f423d728",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=0bfef52a44075162940391ee650c313e",
         },
         {
            title: "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03705 rev. 6 - BIOS November 2020 Security Updates",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=892287da75187b64a9430d6c2f52fb94",
         },
         {
            title: "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03705 rev. 6 - BIOS November 2020 Security Updates",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=f872c139829b190dd155b5676016edf1",
         },
         {
            title: "HP: HPSBHF03705 rev. 1 - BIOS November 2020 Security Updates",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=hpsbhf03705",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8698",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-668",
            trust: 1,
         },
         {
            problemtype: "Lack of information (CWE-noinfo) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            db: "NVD",
            id: "CVE-2020-8698",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-8698",
         },
         {
            trust: 1.7,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381",
         },
         {
            trust: 1.7,
            url: "https://security.netapp.com/advisory/ntap-20201113-0006/",
         },
         {
            trust: 1.7,
            url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/maagik5cxkbpgy3r4ur5vo56m7mklz43/",
         },
         {
            trust: 1.7,
            url: "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf",
         },
         {
            trust: 1.2,
            url: "https://access.redhat.com/security/cve/cve-2020-8698",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu91051134/",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-8696",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-8695",
         },
         {
            trust: 0.6,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.6,
            url: "https://access.redhat.com/security/cve/cve-2020-8695",
         },
         {
            trust: 0.6,
            url: "https://access.redhat.com/security/team/key/",
         },
         {
            trust: 0.6,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.6,
            url: "https://access.redhat.com/security/cve/cve-2020-8696",
         },
         {
            trust: 0.6,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/163863/red-hat-security-advisory-2021-3176-01.html",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.3959/",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/163757/red-hat-security-advisory-2021-3027-01.html",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021081834",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/160035/ubuntu-security-notice-usn-4628-2.html",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.4200/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.4153/",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/160018/ubuntu-security-notice-usn-4628-1.html",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/163772/red-hat-security-advisory-2021-3029-01.html",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-22-132-05",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.4327/",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/160187/red-hat-security-advisory-2020-5184-01.html",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021081125",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021083127",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2022.2355",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/163993/red-hat-security-advisory-2021-3364-01.html",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/intel-processors-information-disclosure-33881",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.4033/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.2905",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.4017/",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/162588/ubuntu-security-notice-usn-4628-3.html",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.4124/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.0423",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.2721",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021080915",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.2604",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.2945",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-49266",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.2672",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/160407/red-hat-security-advisory-2020-5369-01.html",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.1664",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.2797",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-24511",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-24512",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-24512",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-24489",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-24489",
         },
         {
            trust: 0.4,
            url: "https://listman.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-0549",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-0543",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-0549",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-0543",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-24511",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-0548",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-0548",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/updates/classification/#moderate",
         },
         {
            trust: 0.2,
            url: "https://usn.ubuntu.com/4628-1",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/668.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2020:5185",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-05",
         },
         {
            trust: 0.1,
            url: "https://support.hp.com/us-en/document/c06962236",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2021:3255",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2021:3323",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2021:3028",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2021:3029",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2020:5181",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.16.04.1",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.18.04.1",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.20.10.1",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.20.04.1",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2020:5183",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/4628-2",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/bugs/1903883",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.18.04.2",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.20.04.2",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.16.04.2",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.20.10.2",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8698",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            db: "PACKETSTORM",
            id: "163924",
         },
         {
            db: "PACKETSTORM",
            id: "163954",
         },
         {
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            db: "PACKETSTORM",
            id: "160191",
         },
         {
            db: "PACKETSTORM",
            id: "160018",
         },
         {
            db: "PACKETSTORM",
            id: "160188",
         },
         {
            db: "PACKETSTORM",
            id: "160035",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
         {
            db: "NVD",
            id: "CVE-2020-8698",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2020-8698",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            db: "PACKETSTORM",
            id: "163924",
         },
         {
            db: "PACKETSTORM",
            id: "163954",
         },
         {
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            db: "PACKETSTORM",
            id: "160191",
         },
         {
            db: "PACKETSTORM",
            id: "160018",
         },
         {
            db: "PACKETSTORM",
            id: "160188",
         },
         {
            db: "PACKETSTORM",
            id: "160035",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
         {
            db: "NVD",
            id: "CVE-2020-8698",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-11-12T00:00:00",
            db: "VULMON",
            id: "CVE-2020-8698",
         },
         {
            date: "2021-07-02T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            date: "2021-08-27T19:22:22",
            db: "PACKETSTORM",
            id: "163924",
         },
         {
            date: "2021-08-31T15:43:48",
            db: "PACKETSTORM",
            id: "163954",
         },
         {
            date: "2021-08-09T14:15:45",
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            date: "2021-08-10T14:49:53",
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            date: "2020-11-24T15:00:08",
            db: "PACKETSTORM",
            id: "160191",
         },
         {
            date: "2020-11-11T14:59:21",
            db: "PACKETSTORM",
            id: "160018",
         },
         {
            date: "2020-11-24T14:59:25",
            db: "PACKETSTORM",
            id: "160188",
         },
         {
            date: "2020-11-12T15:38:50",
            db: "PACKETSTORM",
            id: "160035",
         },
         {
            date: "2019-11-10T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
         {
            date: "2020-11-12T18:15:00",
            db: "NVD",
            id: "CVE-2020-8698",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "VULMON",
            id: "CVE-2020-8698",
         },
         {
            date: "2021-07-02T04:40:00",
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            date: "2022-05-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
         {
            date: "2022-04-26T16:33:00",
            db: "NVD",
            id: "CVE-2020-8698",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "PACKETSTORM",
            id: "160018",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
      ],
      trust: 0.7,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Intel(R)  Vulnerabilities in processor products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "access control error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
      ],
      trust: 0.6,
   },
}

var-202106-0358
Vulnerability from variot

In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the AhciBusDxe, IdeBusDxe, NvmExpressDxe, SdHostDriverDxe, and SdMmcDeviceDxe drivers are 05.16.25, 05.26.25, 05.35.25, 05.43.25, and 05.51.25 (for Kernel 5.1 through 5.5). The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count

SMM Privilege Escalation 10

SMM Memory Corruption 12

DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. Insyde InsydeH2O Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0358",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic ipc377g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.25.44",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.2",
         },
         {
            model: "simatic ipc647e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.35.25",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.43.25",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "ruggedcom apr1808",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.4",
         },
         {
            model: "simatic ipc627e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc847e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.1",
         },
         {
            model: "simatic ipc677e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.26.25",
         },
         {
            model: "simatic ipc227g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.3",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.16.25",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.34.44",
         },
         {
            model: "simatic ipc327g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc127e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.42.44",
         },
         {
            model: "simatic ipc277g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc477e pro",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: null,
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
         {
            db: "NVD",
            id: "CVE-2020-27339",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.34.44",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.25.44",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.16.25",
                        versionStartIncluding: "5.1",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.42.44",
                        versionStartIncluding: "5.4",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.35.25",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.26.25",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.43.25",
                        versionStartIncluding: "5.4",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:ruggedcom_apr1808_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:ruggedcom_apr1808:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc127e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc227g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc277g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc327g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc377g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-27339",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This document was written by Vijay Sarvepalli.Statement Date:   March 01, 2022",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2020-27339",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.2,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2020-27339",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 6.7,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-27339",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-27339",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202106-1324",
                  trust: 0.6,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
         {
            db: "NVD",
            id: "CVE-2020-27339",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-1324",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the AhciBusDxe, IdeBusDxe, NvmExpressDxe, SdHostDriverDxe, and SdMmcDeviceDxe drivers are 05.16.25, 05.26.25, 05.35.25, 05.43.25, and 05.51.25 (for Kernel 5.1 through 5.5). The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count \n\n\n\n\nSMM Privilege Escalation 10 \n\n\n SMM Memory Corruption  12 \n\n\n DXE Memory Corruption 1CVE-2020-27339 Affected\nCVE-2020-5953 Affected\nCVE-2021-33625 Affected\nCVE-2021-33626 Affected\nCVE-2021-33627 Affected\nCVE-2021-41837 Affected\nCVE-2021-41838 Affected\nCVE-2021-41839 Affected\nCVE-2021-41840 Affected\nCVE-2021-41841 Affected\nCVE-2021-42059 Affected\nCVE-2021-42060 Not Affected\nCVE-2021-42113 Affected\nCVE-2021-42554 Affected\nCVE-2021-43323 Affected\nCVE-2021-43522 Affected\nCVE-2021-43615 Not Affected\nCVE-2021-45969 Not Affected\nCVE-2021-45970 Not Affected\nCVE-2021-45971 Not Affected\nCVE-2022-24030 Not Affected\nCVE-2022-24031 Not Affected\nCVE-2022-24069 Not Affected\nCVE-2022-28806 Unknown. Insyde InsydeH2O Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-27339",
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-27339",
            trust: 4,
         },
         {
            db: "SIEMENS",
            id: "SSA-306654",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97136454",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007558",
            trust: 0.8,
         },
         {
            db: "LENOVO",
            id: "LEN-73436",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-1324",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
         {
            db: "NVD",
            id: "CVE-2020-27339",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-1324",
         },
      ],
   },
   id: "VAR-202106-0358",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2023-12-18T11:38:07.442000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INSYDE-SA-2021001",
            trust: 0.8,
            url: "https://www.insyde.com/security-pledge/sa-2021001",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1,
         },
         {
            problemtype: "Improper authority management (CWE-269) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
         {
            db: "NVD",
            id: "CVE-2020-27339",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
         },
         {
            trust: 1.6,
            url: "https://security.netapp.com/advisory/ntap-20220216-0005/",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge/sa-2021001",
         },
         {
            trust: 0.8,
            url: "cve-2020-27339  ",
         },
         {
            trust: 0.8,
            url: "cve-2020-5953  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33625  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33626  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33627  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41837  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41838  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41839  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41840  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41841  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42059  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42060  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42113  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42554  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43323  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43522  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43615  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45969  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45970  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45971  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24030  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24031  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24069  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-28806  ",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu97136454/index.html",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-27339",
         },
         {
            trust: 0.6,
            url: "https://www.insyde.com/products",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/independent-bios-developers-multiple-vulnerabilities-via-uefi-37438",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-73436",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
         {
            db: "NVD",
            id: "CVE-2020-27339",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-1324",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
         {
            db: "NVD",
            id: "CVE-2020-27339",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-1324",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-01T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
         {
            date: "2021-06-16T16:15:07.897000",
            db: "NVD",
            id: "CVE-2020-27339",
         },
         {
            date: "2021-06-16T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-1324",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-28T07:09:00",
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
         {
            date: "2022-07-12T17:42:04.277000",
            db: "NVD",
            id: "CVE-2020-27339",
         },
         {
            date: "2022-07-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-1324",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-1324",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-1324",
         },
      ],
      trust: 0.6,
   },
}

var-202202-0037
Vulnerability from variot

An issue was discovered in Kernel 5.x in Insyde InsydeH2O, affecting HddPassword. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count

SMM Privilege Escalation 10

SMM Memory Corruption 12

DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. Insyde InsydeH2O Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0037",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc377g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.2",
         },
         {
            model: "simatic ipc647e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.16.23",
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "fas\\/aff bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.4",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.51.22",
         },
         {
            model: "simatic ipc627e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc847e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.1",
         },
         {
            model: "simatic ipc677e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc227g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.3",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.35.23",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc327g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "ruggedcom ape1808",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc127e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.26.23",
         },
         {
            model: "simatic ipc277g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc477e pro",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.5",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.43.22",
         },
         {
            model: "insydeh2o",
            scope: null,
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
         {
            db: "NVD",
            id: "CVE-2021-33625",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.16.23",
                        versionStartIncluding: "5.1",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.26.23",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.35.23",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.43.22",
                        versionStartIncluding: "5.4",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.51.22",
                        versionStartIncluding: "5.5",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:fas\\/aff_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:ruggedcom_ape1808_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:ruggedcom_ape1808:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc127e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc277g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc227g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc327g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc377g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-33625",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This document was written by Vijay Sarvepalli.Statement Date:   March 01, 2022",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2021-33625",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 6.9,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.4,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:M/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 6.9,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2021-33625",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:M/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.8,
                  impactScore: 6,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "High",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-33625",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Changed",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-33625",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202202-117",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
         {
            db: "NVD",
            id: "CVE-2021-33625",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-117",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "An issue was discovered in Kernel 5.x in Insyde InsydeH2O, affecting HddPassword. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count \n\n\n\n\nSMM Privilege Escalation 10 \n\n\n SMM Memory Corruption  12 \n\n\n DXE Memory Corruption 1CVE-2020-27339 Affected\nCVE-2020-5953 Affected\nCVE-2021-33625 Affected\nCVE-2021-33626 Affected\nCVE-2021-33627 Affected\nCVE-2021-41837 Affected\nCVE-2021-41838 Affected\nCVE-2021-41839 Affected\nCVE-2021-41840 Affected\nCVE-2021-41841 Affected\nCVE-2021-42059 Affected\nCVE-2021-42060 Not Affected\nCVE-2021-42113 Affected\nCVE-2021-42554 Affected\nCVE-2021-43323 Affected\nCVE-2021-43522 Affected\nCVE-2021-43615 Not Affected\nCVE-2021-45969 Not Affected\nCVE-2021-45970 Not Affected\nCVE-2021-45971 Not Affected\nCVE-2022-24030 Not Affected\nCVE-2022-24031 Not Affected\nCVE-2022-24069 Not Affected\nCVE-2022-28806 Unknown. Insyde InsydeH2O Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-33625",
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-33625",
            trust: 4,
         },
         {
            db: "SIEMENS",
            id: "SSA-306654",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97136454",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001343",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2022020319",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-73436",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-117",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
         {
            db: "NVD",
            id: "CVE-2021-33625",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-117",
         },
      ],
   },
   id: "VAR-202202-0037",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2023-12-18T10:53:47.586000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Insyde's Security Pledge Security Advisory",
            trust: 0.8,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            title: "Insyde InsydeH2O Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=180211",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-117",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1,
         },
         {
            problemtype: "Buffer error (CWE-119) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
         {
            db: "NVD",
            id: "CVE-2021-33625",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
         },
         {
            trust: 1.6,
            url: "https://security.netapp.com/advisory/ntap-20220222-0004/",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge/sa-2022014",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-33625",
         },
         {
            trust: 0.8,
            url: "cve-2020-27339  ",
         },
         {
            trust: 0.8,
            url: "cve-2020-5953  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33625  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33626  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33627  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41837  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41838  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41839  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41840  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41841  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42059  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42060  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42113  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42554  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43323  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43522  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43615  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45969  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45970  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45971  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24030  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24031  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24069  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-28806  ",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu97136454/index.html",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/independent-bios-developers-multiple-vulnerabilities-via-uefi-37438",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022020319",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-73436",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
         {
            db: "NVD",
            id: "CVE-2021-33625",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-117",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
         {
            db: "NVD",
            id: "CVE-2021-33625",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-117",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-01T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
         {
            date: "2022-02-03T02:15:06.930000",
            db: "NVD",
            id: "CVE-2021-33625",
         },
         {
            date: "2022-02-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-117",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-28T07:09:00",
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
         {
            date: "2022-04-12T18:17:23.980000",
            db: "NVD",
            id: "CVE-2021-33625",
         },
         {
            date: "2022-03-03T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-117",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-117",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-117",
         },
      ],
      trust: 0.6,
   },
}

var-202110-0264
Vulnerability from variot

A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count

SMM Privilege Escalation 10

SMM Memory Corruption 12

DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. InsydeH2O Includes a vulnerability in incorporating functionality from an untrusted control area.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the PnpSmm, SmmResourceCheckDxe, and BeepStatusCode drivers are 05.08.23, 05.16.23, 05.26.23, 05.35.23, 05.43.23, and 05.51.23 (for Kernel 5.0 up to and including 5.5)

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202110-0264",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic ipc377g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.25.44",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.2",
         },
         {
            model: "simatic ipc647e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.35.25",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.43.25",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "ruggedcom apr1808",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.4",
         },
         {
            model: "simatic ipc627e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc847e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.1",
         },
         {
            model: "simatic ipc677e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.26.25",
         },
         {
            model: "simatic ipc227g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.3",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.16.25",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.34.44",
         },
         {
            model: "simatic ipc327g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc127e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.42.44",
         },
         {
            model: "simatic ipc277g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc477e pro",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: null,
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
         {
            db: "NVD",
            id: "CVE-2021-33626",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.34.44",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.25.44",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.16.25",
                        versionStartIncluding: "5.1",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.42.44",
                        versionStartIncluding: "5.4",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.35.25",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.26.25",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.43.25",
                        versionStartIncluding: "5.4",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:ruggedcom_apr1808_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:ruggedcom_apr1808:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc127e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc227g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc277g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc327g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc377g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-33626",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This document was written by Vijay Sarvepalli.Statement Date:   March 01, 2022",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2021-33626",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.6,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 4.6,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2021-33626",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-33626",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "Low",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-33626",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202109-2000",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
         {
            db: "NVD",
            id: "CVE-2021-33626",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-2000",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count \n\n\n\n\nSMM Privilege Escalation 10 \n\n\n SMM Memory Corruption  12 \n\n\n DXE Memory Corruption 1CVE-2020-27339 Affected\nCVE-2020-5953 Affected\nCVE-2021-33625 Affected\nCVE-2021-33626 Affected\nCVE-2021-33627 Affected\nCVE-2021-41837 Affected\nCVE-2021-41838 Affected\nCVE-2021-41839 Affected\nCVE-2021-41840 Affected\nCVE-2021-41841 Affected\nCVE-2021-42059 Affected\nCVE-2021-42060 Not Affected\nCVE-2021-42113 Affected\nCVE-2021-42554 Affected\nCVE-2021-43323 Affected\nCVE-2021-43522 Affected\nCVE-2021-43615 Not Affected\nCVE-2021-45969 Not Affected\nCVE-2021-45970 Not Affected\nCVE-2021-45971 Not Affected\nCVE-2022-24030 Not Affected\nCVE-2022-24031 Not Affected\nCVE-2022-24069 Not Affected\nCVE-2022-28806 Unknown. InsydeH2O Includes a vulnerability in incorporating functionality from an untrusted control area.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state. In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the PnpSmm, SmmResourceCheckDxe, and BeepStatusCode drivers are 05.08.23, 05.16.23, 05.26.23, 05.35.23, 05.43.23, and 05.51.23 (for Kernel 5.0 up to and including 5.5)",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-33626",
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
         {
            db: "VULMON",
            id: "CVE-2021-33626",
         },
      ],
      trust: 2.43,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-33626",
            trust: 4.1,
         },
         {
            db: "SIEMENS",
            id: "SSA-306654",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97136454",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007559",
            trust: 0.8,
         },
         {
            db: "LENOVO",
            id: "LEN-73436",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-2000",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-33626",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "VULMON",
            id: "CVE-2021-33626",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
         {
            db: "NVD",
            id: "CVE-2021-33626",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-2000",
         },
      ],
   },
   id: "VAR-202110-0264",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2023-12-18T11:10:01.956000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Insyde's Security Pledge Security Advisory",
            trust: 0.8,
            url: "https://www.insyde.com/security-pledge",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-829",
            trust: 1,
         },
         {
            problemtype: "Incorporating features from untrusted control areas (CWE-829) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
         {
            db: "NVD",
            id: "CVE-2021-33626",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://www.insyde.com/security-pledge/sa-2021001",
         },
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
         },
         {
            trust: 1.6,
            url: "https://security.netapp.com/advisory/ntap-20220216-0006/",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-33626",
         },
         {
            trust: 0.8,
            url: "cve-2020-27339  ",
         },
         {
            trust: 0.8,
            url: "cve-2020-5953  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33625  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33626  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33627  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41837  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41838  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41839  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41840  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41841  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42059  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42060  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42113  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42554  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43323  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43522  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43615  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45969  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45970  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45971  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24030  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24031  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24069  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-28806  ",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu97136454/index.html",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/independent-bios-developers-multiple-vulnerabilities-via-uefi-37438",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-73436",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "VULMON",
            id: "CVE-2021-33626",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
         {
            db: "NVD",
            id: "CVE-2021-33626",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-2000",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "VULMON",
            id: "CVE-2021-33626",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
         {
            db: "NVD",
            id: "CVE-2021-33626",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-2000",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-01T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2021-10-01T00:00:00",
            db: "VULMON",
            id: "CVE-2021-33626",
         },
         {
            date: "2022-02-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
         {
            date: "2021-10-01T03:15:06.593000",
            db: "NVD",
            id: "CVE-2021-33626",
         },
         {
            date: "2021-09-30T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-2000",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2021-10-01T00:00:00",
            db: "VULMON",
            id: "CVE-2021-33626",
         },
         {
            date: "2022-02-28T07:09:00",
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
         {
            date: "2022-04-24T02:03:42.070000",
            db: "NVD",
            id: "CVE-2021-33626",
         },
         {
            date: "2022-03-10T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-2000",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202109-2000",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202109-2000",
         },
      ],
      trust: 0.6,
   },
}

var-202106-0696
Vulnerability from variot

Improper buffer restrictions in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32 and 15.0.22 may allow a privileged user to potentially enable escalation of privilege via local access. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0696",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "13.0.47",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "13.30.17",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "14.1.53",
         },
         {
            model: "cloud backup",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "14.5.32",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "12.0.81",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.12.86",
         },
         {
            model: "simatic ipc477e pro",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc647e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic ipc847e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.8.86",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "15.0.22",
         },
         {
            model: "simatic ipc677e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic ipc547g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc627e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.22.86",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc527g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-8703",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "12.0.81",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b360:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b365:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h310:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h370:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:mobile_cm246:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q370:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z390:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "12.0.81",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b360:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b365:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h310:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h370:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:mobile_cm246:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q370:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z390:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "13.0.47",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.0.47",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "13.30.17",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3_l13g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5_l16g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.30.17",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3_l13g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5_l16g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "14.1.53",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "14.1.53",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "14.5.32",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "14.5.32",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "11.8.86",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b150:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_m3-7y32:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h110:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h170:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q150:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q170:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z170:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "11.8.86",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b150:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b250:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m3-7y32:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h110:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h170:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q150:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q170:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q250:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z170:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "11.12.86",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c420:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "11.12.86",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c420:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "11.22.86",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c621a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "11.22.86",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c621a:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "15.0.22",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-11100b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11500b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900kb:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "15.0.22",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-11100b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11500b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900kb:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-8703",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens reported these vulnerabilities to CISA.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-559",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2020-8703",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.6,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "CVE-2020-8703",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "MEDIUM",
                  trust: 1.1,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.8,
                  id: "CVE-2020-8703",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-8703",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202106-559",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-8703",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8703",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-559",
         },
         {
            db: "NVD",
            id: "CVE-2020-8703",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Improper buffer restrictions in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32 and 15.0.22 may allow a privileged user to potentially enable escalation of privilege via local access. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-8703",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8703",
         },
      ],
      trust: 1.53,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "SIEMENS",
            id: "SSA-309571",
            trust: 1.7,
         },
         {
            db: "NVD",
            id: "CVE-2020-8703",
            trust: 1.7,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.1997",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021081109",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021061712",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-222-05",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-51731",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-559",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2020-8703",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8703",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-559",
         },
         {
            db: "NVD",
            id: "CVE-2020-8703",
         },
      ],
   },
   id: "VAR-202106-0696",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5185185333333333,
   },
   last_update_date: "2022-05-04T08:21:47.847000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Intel(R) CSME Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=155254",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=240e27e5c8fba28153598a375a2a4130",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8703",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-559",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-8703",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html",
         },
         {
            trust: 1.7,
            url: "https://security.netapp.com/advisory/ntap-20210611-0004/",
         },
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021081109",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-51731",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/intel-processor-multiple-vulnerabilities-via-csme-sps-lms-35670",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021061712",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.1997",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-222-05",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/119.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://cert-portal.siemens.com/productcert/txt/ssa-309571.txt",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8703",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-559",
         },
         {
            db: "NVD",
            id: "CVE-2020-8703",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2020-8703",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-559",
         },
         {
            db: "NVD",
            id: "CVE-2020-8703",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-06-09T00:00:00",
            db: "VULMON",
            id: "CVE-2020-8703",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-06-08T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-559",
         },
         {
            date: "2021-06-09T19:15:00",
            db: "NVD",
            id: "CVE-2020-8703",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-08-10T00:00:00",
            db: "VULMON",
            id: "CVE-2020-8703",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2022-04-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-559",
         },
         {
            date: "2022-04-22T16:20:00",
            db: "NVD",
            id: "CVE-2020-8703",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-559",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Pillow Buffer error vulnerability",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
}

var-202006-0241
Vulnerability from variot

Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel 06_3DH and Intel 06_9EH are both a central processing unit (CPU) product of Intel Corporation of the United States. Security vulnerabilities exist in several Intel products. The following products and versions are affected: Intel Celeron 1000M; Celeron 1005M; Celeron 1007U; Celeron 1019Y; Celeron 1020m, etc. (CVE-2020-12654).

The microcode update for HEDT and Xeon CPUs with signature 0x50654 which was reverted in DSA 4565-2 is now included again with a fixed release.

The upstream update for Skylake-U/Y (signature 0x406e3) had to be excluded from this update due to reported hangs on boot.

For the stable distribution (buster), these problems have been fixed in version 3.20200609.2~deb10u1.

We recommend that you upgrade your intel-microcode packages.

For the detailed security status of intel-microcode please refer to its security tracker page at: https://security-tracker.debian.org/tracker/intel-microcode

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl7iSvVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RH6g/9FYOaN5XyFFC8jVEmfdIl0pa8SqEH2+V1s27pAEOMhGAXuLrUms9wDq0J IoM54q/dz3rH3GiSi5nNqQDxLGx40DNSM5CCdCZIC22YvALS3aYsqpSSlDiyQZSb Im7isH8ntWIc3bedPWzfhui4VA19p8gnbFUetts3fp+uPeimd/QfPnJDN8wHUAL1 V2JzHMYD8v9axenbOxuWSArSnbubEtwpmHfhMzIMkE5150qhyofpzPBsKGoASa7q kPrwbUKBC11dGi+sV49rpXTf/ml7KDUDIrsA75sLC9WhckBcMdAkkVPLJyytAZ6A SqaOVJv+j0wVmhTtIqPxjvYCvX0y8i6NyQi+aliqzq7uEiQtaPQV8sWgDhyhTWga kxxiNuLfcuiEKkKToHdrkLLI1JiisqQTcwyRHg6k3X8+sNmKe6vFu3KzVbLo8+MH c3zEDQHP7XHm/euneb5ZFdg7+Rli03KWFm8/LNJQhrDcsFU/Si5268OwnzpGydwc eaIwuHtc8R64q+m5Aujo7X7kKk67zN7XhmX0nbr9Egni7dhG3iVrMtF27BTPMcML Gzz1pjktlYiySJYON64N/ooZchwAoAEhM9F1yPREXNf6PfRQG3lNjX3UeC4Ci0Ay /NuaKQSSlwd3XOy/dajSEfceu8uI/RZQ3RccTZRtWT58qcnwAnE= =cQzh -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: microcode_ctl security, bug fix and enhancement update Advisory ID: RHSA-2021:3028-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:3028 Issue date: 2021-08-09 CVE Names: CVE-2020-0543 CVE-2020-0548 CVE-2020-0549 CVE-2020-8695 CVE-2020-8696 CVE-2020-8698 CVE-2020-24489 CVE-2020-24511 CVE-2020-24512 ==================================================================== 1. Summary:

An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64

  1. Description:

The microcode_ctl packages provide microcode updates for Intel.

Security Fix(es):

  • hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)

  • hw: Vector Register Data Sampling (CVE-2020-0548)

  • hw: L1D Cache Eviction Sampling (CVE-2020-0549)

  • hw: vt-d related privilege escalation (CVE-2020-24489)

  • hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)

  • hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)

  • hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)

  • hw: Vector Register Leakage-Active (CVE-2020-8696)

  • hw: Fast forward store predictor (CVE-2020-8698)

  • Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1788786 - CVE-2020-0548 hw: Vector Register Data Sampling 1788788 - CVE-2020-0549 hw: L1D Cache Eviction Sampling 1827165 - CVE-2020-0543 hw: Special Register Buffer Data Sampling (SRBDS) 1828583 - CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface 1890355 - CVE-2020-8696 hw: Vector Register Leakage-Active 1890356 - CVE-2020-8698 hw: Fast forward store predictor 1897684 - [rhel-7.9.z] Re-enable 06-5e-03 (SKL-H/S, CPUID 0x506e3) latest microcode updates 1962650 - CVE-2020-24489 hw: vt-d related privilege escalation 1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors 1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors

  1. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source: microcode_ctl-2.1-73.11.el7_9.src.rpm

x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: microcode_ctl-2.1-73.11.el7_9.src.rpm

x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: microcode_ctl-2.1-73.11.el7_9.src.rpm

x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: microcode_ctl-2.1-73.11.el7_9.src.rpm

x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2020-0543 https://access.redhat.com/security/cve/CVE-2020-0548 https://access.redhat.com/security/cve/CVE-2020-0549 https://access.redhat.com/security/cve/CVE-2020-8695 https://access.redhat.com/security/cve/CVE-2020-8696 https://access.redhat.com/security/cve/CVE-2020-8698 https://access.redhat.com/security/cve/CVE-2020-24489 https://access.redhat.com/security/cve/CVE-2020-24511 https://access.redhat.com/security/cve/CVE-2020-24512 https://access.redhat.com/security/updates/classification/#important

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBYRD++tzjgjWX9erEAQhA1A//eeO88DFGpTcHgCHrsXimUtK3MZX0RppT 5UOWuXgmPJniMPDALpkfTNTnNGASjBB+WDclaW2d/sZf52PzYLao5wGVIYdUx3Nl l9IvbGNMm0F7eI7aHdT2QnUhQQl1IpJrbmkhvBM2w85EmOfqlq+CpXnJMRXzoRdv sFPrWAo1opDNnBV6iYAnyULHFuWwcvU28n3JU945W8p/PvqJgSze77i4dmpzYkBj ljzVrIUl2pizBmnQMj03JJ+YeB8+oKb0uD2RdqHoxkUSFGH9OW6s/qytHu/eR4uL Y7WmIfHUxGsVRcmIjo/VaAvvWs4A3hdOL3nGdRAMQOKp+VoDcX7VDNURoxK/bkcJ OepHSyfWPCVXvOmU5l2ov1uzVQ/F+ajeevMehuzwQlTAIur5qE2eQ2Mwitfh/7WZ W3x67peCz51zVPtb7rkQfpzQzZKkjSAAclOYMzltv2PA5vSXZy8+hEqWZwqtesQn ltz36bjQMvRRhr1yGDbaFI5dcTB8T/eIkzmD6wPfbd7r7SEuE0GUd8Yf69VghGL2 f+mvR8oWb2x3RHXbpFm4aIt5mJHqIgfXDAohz7lXgLyJwQefyeJ5w+W8nOe+ZSK/ yvfiVQZz9tvPq8yqC87YWTA7zcnhoSmPvXRicJakpfJL/oz043Tc17jqxIra36sA UjXnNBNse8A=LIYI -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . (CVE-2020-0548)

It was discovered that on some Intel processors, data from the most recently evicted modified L1 data cache (L1D) line may be propagated into an unused (invalid) L1D fill buffer. ========================================================================= Ubuntu Security Notice USN-4393-1 June 10, 2020

linux vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description: - linux: Linux kernel

Details:

It was discovered that the Marvell WiFi-Ex Driver in the Linux kernel did not properly validate status lengths in messages received from an access point, leading to a buffer overflow. A physically proximate attacker controlling an access point could use this to construct messages that could possibly result in arbitrary code execution. (CVE-2020-12654)

It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. (CVE-2020-0543)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04 ESM: linux-image-3.2.0-147-generic 3.2.0-147.194 linux-image-3.2.0-147-generic-pae 3.2.0-147.194 linux-image-3.2.0-147-highbank 3.2.0-147.194 linux-image-3.2.0-147-powerpc-smp 3.2.0-147.194 linux-image-3.2.0-147-powerpc64-smp 3.2.0-147.194 linux-image-3.2.0-147-virtual 3.2.0-147.194 linux-image-generic 3.2.0.147.161 linux-image-generic-pae 3.2.0.147.161 linux-image-highbank 3.2.0.147.161 linux-image-powerpc 3.2.0.147.161 linux-image-powerpc-smp 3.2.0.147.161 linux-image-powerpc64-smp 3.2.0.147.161 linux-image-server 3.2.0.147.161 linux-image-virtual 3.2.0.147.161

Please note that the mitigation for CVE-2020-0543 requires a processor microcode update to be applied, either from your system manufacturer or via the intel-microcode package. The kernel update for this issue provides the ability to disable the mitigation and to report vulnerability status.

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202006-0241",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "core i3-3217ue",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8120",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6600t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1245 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7007u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7400",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4010y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7210u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4010u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 4405y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3560y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 3765u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g5400",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-5675c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8100",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3240",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "19.10",
         },
         {
            model: "core i7-8705g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium a1018 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1125c v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6310u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1270 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g3900te",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3120m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 1037u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3450t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-9850h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3220t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc627e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.06",
         },
         {
            model: "core i7-8569u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 1000m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1505l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7820hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2124",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3229y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m5-6y54",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4430s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8400",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4030u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7920hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7300u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2146g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc427d",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "xeon e3-1505m v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6600",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2184g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7567u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1280 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3470",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6820hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2286m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8709g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6300u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core 4205u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4130",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1225 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc477e pro",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.14",
         },
         {
            model: "core i7-7700t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7320t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6510u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m-5y10c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3840qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7100u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 3865u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic itp1000",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "23.01.08",
         },
         {
            model: "celeron 2957u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 1020m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6100e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3689y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1265l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4402ec",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3517ue",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4250u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3520m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8400h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7442eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1225 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8700k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1245 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2174g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1285l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8400b",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 3965y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3570k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4700ec",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-9600k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4160t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-5350u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7y75",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m3-7y30",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1501l v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6567u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3439y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3570",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6870hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1286 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g1620t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4030y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4258u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4702mq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1220 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-9400",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3220t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1585l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6300",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4100m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1268l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5700hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4590t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3555le",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4770s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1290 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1246 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1275 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g3930te",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8300t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8350k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "threat intelligence exchange server",
            scope: "lte",
            trust: 1,
            vendor: "mcafee",
            version: "2.3.1",
         },
         {
            model: "pentium g5400t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1271 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4750hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g3900t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3360m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8130u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-10510u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc627d",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "core i7-3612qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g5500",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic field pg m6",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "26.01.07",
         },
         {
            model: "xeon e3-1505l v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4288u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4810mq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4370",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 927ue",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m-5y70",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1275 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1545m v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4350u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3260",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1258l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2276me",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4005u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-5015u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7440eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7102e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8600k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4570r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i9-8950hk",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 2981u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4020y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6100h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3350p",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g3920",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-5575r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1240l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 5305u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m-5y10",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3610me",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1105c v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3610qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2244g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1220 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-5010u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g4900",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1105c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1270 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1281 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1515m v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "leap",
            scope: "eq",
            trust: 1,
            vendor: "opensuse",
            version: "15.1",
         },
         {
            model: "celeron 1020e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7500",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2124g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4500u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-5005u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3635qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7400t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5750hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4360",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7101te",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1225 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4500",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4790t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6100u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8300h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-9700k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4712mq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7600u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4785t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7360u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2234",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8020",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4300u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3317u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4540",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g5600",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "18.04",
         },
         {
            model: "core m7-6y75",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4520",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4360t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3430",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6110u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6650u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3217u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 725c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6440eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4012y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5950hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4860hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8259u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc427e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.14",
         },
         {
            model: "xeon e3-1505m v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6360u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3320m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4200u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7167u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3340m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m-5y10a",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3420t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8100t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 1019y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3765u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4710hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3225",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4400t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3210m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium gold 6405u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4670r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4600u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1245 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3210",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8700b",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1278l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7560u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3667u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6400t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8670t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3825u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g2140 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g5500t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6267u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "threat intelligence exchange server",
            scope: "gte",
            trust: 1,
            vendor: "mcafee",
            version: "2.0.0",
         },
         {
            model: "celeron g1610",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7260u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4670k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5775c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-9600kf",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4760hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7500t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m3-6y30",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1230 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6820hk",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6500",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4770r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4400te",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1558l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6500te",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g3902e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3250t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1240 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2276g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4278u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5650u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3240t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3340s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4210y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7110u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3450",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic field pg m5",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "22.01.08",
         },
         {
            model: "core i5-4690s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8400t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6100",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3205u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8265u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g1820t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6500u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6700t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7y57",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3940xm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8700t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc677d",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "celeron 2980u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g3920t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4158u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "20.04",
         },
         {
            model: "core i9-9900k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3460",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1501m v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2284g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3556u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4400",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-5350",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7020u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1220l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6820eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3227u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g2120t v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4210h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1578l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4590",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3920xm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3770k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3558u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4570",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4770t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7120",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4220y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1280 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8700",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8100h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2278g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4300y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4900mq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5850hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g4920",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4370t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i9-9880h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3250",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6120t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2226ge",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1245 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1230l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m5-6y57",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8809g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8420",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g2030 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m-5y51",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1220 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4690t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6822eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g2100t v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4100u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1286l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6100t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i9-9900kf",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 2129y v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1225 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8250u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1260l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 2030m v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc527g",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1.4.0",
         },
         {
            model: "core 9750hf",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3570t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3450s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m3-8100y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core 4410y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6500t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 1405 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3560m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6320t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3330",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6700te",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2126g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8557u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4330t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc847d",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "pentium g5420",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1240 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g2010 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3770t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "12.04",
         },
         {
            model: "pentium g2130 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8210y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3230m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7300hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1235 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1241 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3250",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g1850",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-10210y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 1017u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4670",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3220",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc477e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.14",
         },
         {
            model: "core i3-4110m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8850h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4308u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8550",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4130t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4500t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7200u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 1047ue",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3615qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5600u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-5157u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1240 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7267u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3632qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3470s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6660u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4120u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4202y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 2020m v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 2955u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3260t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2288g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-i3-8100h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7700hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "leap",
            scope: "eq",
            trust: 1,
            vendor: "opensuse",
            version: "15.2",
         },
         {
            model: "celeron g3940",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3612qe",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 2127u v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3820qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2186m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3537u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8500t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4770hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4170",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4770k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7510u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4440s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1125c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4150t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4350",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core 4415y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6300t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3440",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3380m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1575m v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-5257u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2134",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1280 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3340",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4590s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3770",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6770hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6350hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1235l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8420t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4440",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4260u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5557u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8500b",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7700",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8000",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4765t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6120",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7700k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2276ml",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 3755u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6400",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4710mq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7500u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-2115c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4025u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g2020 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7100e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2176m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc547g",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "r1.28.0",
         },
         {
            model: "celeron g1840",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4150",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8145u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4670s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6260u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4722hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4790s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7740x",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "31",
         },
         {
            model: "core i5-10210u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7600t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g3900",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i9-9980hk",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic field pg m4",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "celeron g1840t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4570s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g4950",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g1610t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6287u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6600u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3450",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4210u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7440hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3610qe",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3615qe",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4460",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g4900t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4980hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 3955u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4558u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1220 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2278gel",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2224g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc647e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.06",
         },
         {
            model: "core 8269u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3805u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-9400h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7820hk",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3550s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-5200u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2254me",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "14.04",
         },
         {
            model: "xeon e3-1270",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3115c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3240",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4670t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7660u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1535m v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g1630",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "32",
         },
         {
            model: "core i5-3475s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7600",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6200u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1226 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1280 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3330s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core 9300h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8565u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4700eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6700",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium b925c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2236",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7120t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 4405u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1265l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3470t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4170t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4702ec",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3420",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1275l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium b915c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6920hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8670",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8510y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4578u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4700hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-9700kf",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3460t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g5420t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2144g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2136",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7101e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7600k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4870hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3240t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2224",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3120me",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7820eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3540m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1275 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-10510y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4200y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4330",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4520t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc647d",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "core m-5y3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 2970m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1285 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8600",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5550u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8706g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 1007u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4790",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8559u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4700mq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4690",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2274g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3550",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3258",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-9400f",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "threat intelligence exchange server",
            scope: "eq",
            trust: 1,
            vendor: "mcafee",
            version: "3.0.0",
         },
         {
            model: "core i5-3437u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4702hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7340",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3517u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2276m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3770s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6210u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4712hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6700hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6100te",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6320",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4550u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4460t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc827d",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "core i3-6167u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-5287u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc847e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.06",
         },
         {
            model: "celeron g1820",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1585 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1230 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3570s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8305g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g2120 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2246g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1270 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc3000 smart",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1.b",
         },
         {
            model: "core i5-6442eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4800mq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-5250u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8650u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7640x",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2278ge",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8310y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8650k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6440hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6300hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3440t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1240l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6560u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1268l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8650",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1276 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1240 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1230 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "16.04",
         },
         {
            model: "core i3-3130m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1220l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g4930",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3110m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8750h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc347e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "core i5-10310y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4570t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g2020t v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1231 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3720qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3687u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simotion p320-4e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "pentium g3470",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3561y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6600k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1230 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5850eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4910mq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3630qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8500",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3427u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1565l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6700k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6970hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8200y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8365u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4430",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7500u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4960hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7130u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g1830",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4350t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8560u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g1620",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3665u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2176g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 3965u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8550u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m-5y71",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8600t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4720hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1285 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 1005m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3337u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1275 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8109u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-10110y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7100h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 4415u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1265l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 2117u v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7y54",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4610y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-5006u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simotion p320-4s",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "core 5405u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8300",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1285 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4510u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3339y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5700eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2186g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4770",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8665u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4420t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2254ml",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc677e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.06",
         },
         {
            model: "core i5-4302y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3245",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3740qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4460s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3250t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4160",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2226g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8350u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc477d",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "core i3-8000t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5775r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4650u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g3930e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4950hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4420",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1535m v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7287u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3215u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc547e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "celeron 3855u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4850hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1221 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8500y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g2030t v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4340",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5500u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-5675r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4771",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3220",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-5020u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6102e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-0543",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Red Hat",
      sources: [
         {
            db: "PACKETSTORM",
            id: "163956",
         },
         {
            db: "PACKETSTORM",
            id: "163757",
         },
         {
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            db: "PACKETSTORM",
            id: "163772",
         },
      ],
      trust: 0.4,
   },
   cve: "CVE-2020-0543",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 2.1,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "CVE-2020-0543",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "LOW",
                  trust: 1.1,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 2.1,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "VHN-161977",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "LOW",
                  trust: 0.1,
                  vectorString: "AV:L/AC:L/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2020-0543",
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2020-0543",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-161977",
                  trust: 0.1,
                  value: "LOW",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-0543",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-161977",
         },
         {
            db: "VULMON",
            id: "CVE-2020-0543",
         },
         {
            db: "NVD",
            id: "CVE-2020-0543",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel 06_3DH and Intel 06_9EH are both a central processing unit (CPU) product of Intel Corporation of the United States. Security vulnerabilities exist in several Intel products. The following products and versions are affected: Intel Celeron 1000M; Celeron 1005M; Celeron 1007U; Celeron 1019Y; Celeron 1020m, etc. (CVE-2020-12654). \n\nThe microcode update for HEDT and Xeon CPUs with signature 0x50654 which\nwas reverted in DSA 4565-2 is now included again with a fixed release. \n\nThe upstream update for Skylake-U/Y (signature 0x406e3) had to be\nexcluded from this update due to reported hangs on boot. \n\nFor the stable distribution (buster), these problems have been fixed in\nversion 3.20200609.2~deb10u1. \n\nWe recommend that you upgrade your intel-microcode packages. \n\nFor the detailed security status of intel-microcode please refer to its\nsecurity tracker page at:\nhttps://security-tracker.debian.org/tracker/intel-microcode\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n\niQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl7iSvVfFIAAAAAALgAo\naXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2\nNDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND\nz0RH6g/9FYOaN5XyFFC8jVEmfdIl0pa8SqEH2+V1s27pAEOMhGAXuLrUms9wDq0J\nIoM54q/dz3rH3GiSi5nNqQDxLGx40DNSM5CCdCZIC22YvALS3aYsqpSSlDiyQZSb\nIm7isH8ntWIc3bedPWzfhui4VA19p8gnbFUetts3fp+uPeimd/QfPnJDN8wHUAL1\nV2JzHMYD8v9axenbOxuWSArSnbubEtwpmHfhMzIMkE5150qhyofpzPBsKGoASa7q\nkPrwbUKBC11dGi+sV49rpXTf/ml7KDUDIrsA75sLC9WhckBcMdAkkVPLJyytAZ6A\nSqaOVJv+j0wVmhTtIqPxjvYCvX0y8i6NyQi+aliqzq7uEiQtaPQV8sWgDhyhTWga\nkxxiNuLfcuiEKkKToHdrkLLI1JiisqQTcwyRHg6k3X8+sNmKe6vFu3KzVbLo8+MH\nc3zEDQHP7XHm/euneb5ZFdg7+Rli03KWFm8/LNJQhrDcsFU/Si5268OwnzpGydwc\neaIwuHtc8R64q+m5Aujo7X7kKk67zN7XhmX0nbr9Egni7dhG3iVrMtF27BTPMcML\nGzz1pjktlYiySJYON64N/ooZchwAoAEhM9F1yPREXNf6PfRQG3lNjX3UeC4Ci0Ay\n/NuaKQSSlwd3XOy/dajSEfceu8uI/RZQ3RccTZRtWT58qcnwAnE=\n=cQzh\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n====================================================================                   \nRed Hat Security Advisory\n\nSynopsis:          Important: microcode_ctl security, bug fix and enhancement update\nAdvisory ID:       RHSA-2021:3028-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2021:3028\nIssue date:        2021-08-09\nCVE Names:         CVE-2020-0543 CVE-2020-0548 CVE-2020-0549\n                   CVE-2020-8695 CVE-2020-8696 CVE-2020-8698\n                   CVE-2020-24489 CVE-2020-24511 CVE-2020-24512\n====================================================================\n1. Summary:\n\nAn update for microcode_ctl is now available for Red Hat Enterprise Linux\n7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. Description:\n\nThe microcode_ctl packages provide microcode updates for Intel. \n\nSecurity Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* hw: improper isolation of shared resources in some Intel Processors\n(CVE-2020-24511)\n\n* hw: observable timing discrepancy in some Intel Processors\n(CVE-2020-24512)\n\n* hw: Information disclosure issue in Intel SGX via RAPL interface\n(CVE-2020-8695)\n\n* hw: Vector Register Leakage-Active (CVE-2020-8696)\n\n* hw: Fast forward store predictor (CVE-2020-8698)\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1788786 - CVE-2020-0548 hw: Vector Register Data Sampling\n1788788 - CVE-2020-0549 hw: L1D Cache Eviction Sampling\n1827165 - CVE-2020-0543 hw: Special Register Buffer Data Sampling (SRBDS)\n1828583 - CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface\n1890355 - CVE-2020-8696 hw: Vector Register Leakage-Active\n1890356 - CVE-2020-8698 hw: Fast forward store predictor\n1897684 - [rhel-7.9.z] Re-enable 06-5e-03 (SKL-H/S, CPUID 0x506e3) latest microcode updates\n1962650 - CVE-2020-24489 hw: vt-d related privilege escalation\n1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors\n1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-0543\nhttps://access.redhat.com/security/cve/CVE-2020-0548\nhttps://access.redhat.com/security/cve/CVE-2020-0549\nhttps://access.redhat.com/security/cve/CVE-2020-8695\nhttps://access.redhat.com/security/cve/CVE-2020-8696\nhttps://access.redhat.com/security/cve/CVE-2020-8698\nhttps://access.redhat.com/security/cve/CVE-2020-24489\nhttps://access.redhat.com/security/cve/CVE-2020-24511\nhttps://access.redhat.com/security/cve/CVE-2020-24512\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQIVAwUBYRD++tzjgjWX9erEAQhA1A//eeO88DFGpTcHgCHrsXimUtK3MZX0RppT\n5UOWuXgmPJniMPDALpkfTNTnNGASjBB+WDclaW2d/sZf52PzYLao5wGVIYdUx3Nl\nl9IvbGNMm0F7eI7aHdT2QnUhQQl1IpJrbmkhvBM2w85EmOfqlq+CpXnJMRXzoRdv\nsFPrWAo1opDNnBV6iYAnyULHFuWwcvU28n3JU945W8p/PvqJgSze77i4dmpzYkBj\nljzVrIUl2pizBmnQMj03JJ+YeB8+oKb0uD2RdqHoxkUSFGH9OW6s/qytHu/eR4uL\nY7WmIfHUxGsVRcmIjo/VaAvvWs4A3hdOL3nGdRAMQOKp+VoDcX7VDNURoxK/bkcJ\nOepHSyfWPCVXvOmU5l2ov1uzVQ/F+ajeevMehuzwQlTAIur5qE2eQ2Mwitfh/7WZ\nW3x67peCz51zVPtb7rkQfpzQzZKkjSAAclOYMzltv2PA5vSXZy8+hEqWZwqtesQn\nltz36bjQMvRRhr1yGDbaFI5dcTB8T/eIkzmD6wPfbd7r7SEuE0GUd8Yf69VghGL2\nf+mvR8oWb2x3RHXbpFm4aIt5mJHqIgfXDAohz7lXgLyJwQefyeJ5w+W8nOe+ZSK/\nyvfiVQZz9tvPq8yqC87YWTA7zcnhoSmPvXRicJakpfJL/oz043Tc17jqxIra36sA\nUjXnNBNse8A=LIYI\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. (CVE-2020-0548)\n\nIt was discovered that on some Intel processors, data from the most\nrecently evicted modified L1 data cache (L1D) line may be propagated into\nan unused (invalid) L1D fill buffer. =========================================================================\nUbuntu Security Notice USN-4393-1\nJune 10, 2020\n\nlinux vulnerabilities\n=========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 ESM\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. \n\nSoftware Description:\n- linux: Linux kernel\n\nDetails:\n\nIt was discovered that the Marvell WiFi-Ex Driver in the Linux kernel did\nnot properly validate status lengths in messages received from an access\npoint, leading to a buffer overflow. A physically proximate attacker\ncontrolling an access point could use this to construct messages that could\npossibly result in arbitrary code execution. (CVE-2020-12654)\n\nIt was discovered that memory contents previously stored in\nmicroarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY\nread operations on Intel client and Xeon E3 processors may be briefly\nexposed to processes on the same or different processor cores. A local\nattacker could use this to expose sensitive information. (CVE-2020-0543)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 ESM:\n  linux-image-3.2.0-147-generic   3.2.0-147.194\n  linux-image-3.2.0-147-generic-pae  3.2.0-147.194\n  linux-image-3.2.0-147-highbank  3.2.0-147.194\n  linux-image-3.2.0-147-powerpc-smp  3.2.0-147.194\n  linux-image-3.2.0-147-powerpc64-smp  3.2.0-147.194\n  linux-image-3.2.0-147-virtual   3.2.0-147.194\n  linux-image-generic             3.2.0.147.161\n  linux-image-generic-pae         3.2.0.147.161\n  linux-image-highbank            3.2.0.147.161\n  linux-image-powerpc             3.2.0.147.161\n  linux-image-powerpc-smp         3.2.0.147.161\n  linux-image-powerpc64-smp       3.2.0.147.161\n  linux-image-server              3.2.0.147.161\n  linux-image-virtual             3.2.0.147.161\n\nPlease note that the mitigation for CVE-2020-0543 requires a processor\nmicrocode update to be applied, either from your system manufacturer\nor via the intel-microcode package. The kernel update for this issue\nprovides the ability to disable the mitigation and to report\nvulnerability status. \n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-0543",
         },
         {
            db: "VULHUB",
            id: "VHN-161977",
         },
         {
            db: "VULMON",
            id: "CVE-2020-0543",
         },
         {
            db: "PACKETSTORM",
            id: "168851",
         },
         {
            db: "PACKETSTORM",
            id: "163956",
         },
         {
            db: "PACKETSTORM",
            id: "163757",
         },
         {
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            db: "PACKETSTORM",
            id: "158005",
         },
         {
            db: "PACKETSTORM",
            id: "158010",
         },
      ],
      trust: 1.71,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-0543",
            trust: 1.9,
         },
         {
            db: "MCAFEE",
            id: "SB10318",
            trust: 1.2,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2020/07/14/5",
            trust: 1.2,
         },
         {
            db: "SIEMENS",
            id: "SSA-534763",
            trust: 1.2,
         },
         {
            db: "PACKETSTORM",
            id: "158010",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "158005",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "157993",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158183",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158015",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "168421",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158198",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158189",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "157997",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158008",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158039",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158250",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158237",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158355",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158238",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158197",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158190",
            trust: 0.1,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202006-630",
            trust: 0.1,
         },
         {
            db: "VULHUB",
            id: "VHN-161977",
            trust: 0.1,
         },
         {
            db: "ICS CERT",
            id: "ICSA-20-252-07",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2020-0543",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "168851",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "163956",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "163757",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "163758",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "163772",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-161977",
         },
         {
            db: "VULMON",
            id: "CVE-2020-0543",
         },
         {
            db: "PACKETSTORM",
            id: "168851",
         },
         {
            db: "PACKETSTORM",
            id: "163956",
         },
         {
            db: "PACKETSTORM",
            id: "163757",
         },
         {
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            db: "PACKETSTORM",
            id: "158005",
         },
         {
            db: "PACKETSTORM",
            id: "158010",
         },
         {
            db: "NVD",
            id: "CVE-2020-0543",
         },
      ],
   },
   id: "VAR-202006-0241",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-161977",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-11-29T21:15:08.266000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2020/06/09/june_2020_patch_tuesday/",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202707 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202680 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202706 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202677 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202432 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202771 - Security Advisory",
         },
         {
            title: "Ubuntu Security Notice: linux vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4393-1",
         },
         {
            title: "Ubuntu Security Notice: intel-microcode vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4385-1",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202433 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202758 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202431 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202842 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202757 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202679 - Security Advisory",
         },
         {
            title: "Ubuntu Security Notice: intel-microcode regression",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4385-2",
         },
         {
            title: "Ubuntu Security Notice: linux, linux-lts-trusty vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4392-1",
         },
         {
            title: "Red Hat: Moderate: kernel security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202430 - Security Advisory",
         },
         {
            title: "Red Hat: Important: kernel security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202667 - Security Advisory",
         },
         {
            title: "Red Hat: Important: kernel security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202427 - Security Advisory",
         },
         {
            title: "Red Hat: Important: kernel-rt security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202428 - Security Advisory",
         },
         {
            title: "Ubuntu Security Notice: linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4390-1",
         },
         {
            title: "Ubuntu Security Notice: linux, linux-aws, linux-aws-5.3, linux-azure, linux-azure-5.3, linux-gcp, linux-gcp-5.3, linux-gke-5.3, linux-hwe, linux-kvm, linux-oracle, linux-oracle-5.3 vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4387-1",
         },
         {
            title: "Amazon Linux AMI: ALAS-2020-1396",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2020-1396",
         },
         {
            title: "Arch Linux Issues: ",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2020-0543 log",
         },
         {
            title: "Debian Security Advisories: DSA-4701-1 intel-microcode -- security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=954d2c33c2a4127c33b5f47731100050",
         },
         {
            title: "Red Hat: Important: kernel security, bug fix, and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203019 - Security Advisory",
         },
         {
            title: "Ubuntu Security Notice: linux-gke-5.0, linux-oem-osp1 vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4388-1",
         },
         {
            title: "Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oracle vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4389-1",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=90d5b24197f663c23e5af8c971118de6",
         },
         {
            title: "Arch Linux Advisories: [ASA-202006-11] intel-ucode: information disclosure",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-202006-11",
         },
         {
            title: "Ubuntu Security Notice: linux, linux-aws, linux-kvm vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4391-1",
         },
         {
            title: "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03668 rev. 4 - Intel® 2020.1 IPU Special Register Buffer Data Sampling and Improper Data Forwarding",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=85333ba63923f2976a4b451bcd61fd00",
         },
         {
            title: "Red Hat: Important: kernel security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202429 - Security Advisory",
         },
         {
            title: "Citrix Security Bulletins: Citrix Hypervisor Security Updates",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=2b9d5984faab280f63afcb8a237cd1d2",
         },
         {
            title: "Amazon Linux 2: ALAS2-2020-1444",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2020-1444",
         },
         {
            title: "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03668 rev. 4 - Intel® 2020.1 IPU Special Register Buffer Data Sampling and Improper Data Forwarding",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=2a42c56bb55866dbb1c5a179d43a79fa",
         },
         {
            title: "Debian Security Advisories: DSA-4699-1 linux -- security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=24f2948c681d56f3f30c8ed6de9c4c9d",
         },
         {
            title: "Amazon Linux AMI: ALAS-2020-1401",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2020-1401",
         },
         {
            title: "Amazon Linux 2: ALAS2KERNEL-5.4-2022-012",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2KERNEL-5.4-2022-012",
         },
         {
            title: "Debian Security Advisories: DSA-4698-1 linux -- security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=88a848047667226a68bbe6de9bb29095",
         },
         {
            title: "Speculative-execution-attacks",
            trust: 0.1,
            url: "https://github.com/Stefan-Radu/Speculative-execution-attacks ",
         },
         {
            title: "get-nist-details",
            trust: 0.1,
            url: "https://github.com/dmarcuccio-solace/get-nist-details ",
         },
         {
            title: "spectre-meltdown",
            trust: 0.1,
            url: "https://github.com/edsonjt81/spectre-meltdown ",
         },
         {
            title: "spectre-meltdown-checker",
            trust: 0.1,
            url: "https://github.com/speed47/spectre-meltdown-checker ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/merlinepedra25/spectre-meltdown-checker ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/merlinepedra/spectre-meltdown-checker ",
         },
         {
            title: "hardware-attacks-state-of-the-art",
            trust: 0.1,
            url: "https://github.com/codexlynx/hardware-attacks-state-of-the-art ",
         },
         {
            title: "Threatpost",
            trust: 0.1,
            url: "https://threatpost.com/critical-intel-flaws-fixed-in-active-management-technology/156458/",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-0543",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-459",
            trust: 1.1,
         },
         {
            problemtype: "CWE-200",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-161977",
         },
         {
            db: "NVD",
            id: "CVE-2020-0543",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.3,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html",
         },
         {
            trust: 1.3,
            url: "https://usn.ubuntu.com/4393-1/",
         },
         {
            trust: 1.2,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf",
         },
         {
            trust: 1.2,
            url: "http://www.openwall.com/lists/oss-security/2020/07/14/5",
         },
         {
            trust: 1.2,
            url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html",
         },
         {
            trust: 1.2,
            url: "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html",
         },
         {
            trust: 1.2,
            url: "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html",
         },
         {
            trust: 1.2,
            url: "https://usn.ubuntu.com/4385-1/",
         },
         {
            trust: 1.2,
            url: "https://usn.ubuntu.com/4387-1/",
         },
         {
            trust: 1.2,
            url: "https://usn.ubuntu.com/4388-1/",
         },
         {
            trust: 1.2,
            url: "https://usn.ubuntu.com/4389-1/",
         },
         {
            trust: 1.2,
            url: "https://usn.ubuntu.com/4390-1/",
         },
         {
            trust: 1.2,
            url: "https://usn.ubuntu.com/4391-1/",
         },
         {
            trust: 1.2,
            url: "https://usn.ubuntu.com/4392-1/",
         },
         {
            trust: 1.1,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10318",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/nqzmoshltbbiecennxa6m7dn5feed4ki/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/grfc7uapkaffh5wx3amdubvhlkyqa2nz/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/dt2vkdmq3i37nbnj256a2exr7ojhxxkz/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/t5oum24zc43g4idt3jucihjtsdxjsk6y/",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-0543",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-0549",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-0548",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-8696",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-24511",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-8698",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-24512",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-24512",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-24489",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-24489",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-8698",
         },
         {
            trust: 0.4,
            url: "https://listman.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-0543",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-8695",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/team/key/",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-8695",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-0549",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-8696",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-24511",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-0548",
         },
         {
            trust: 0.4,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.2,
            url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/dt2vkdmq3i37nbnj256a2exr7ojhxxkz/",
         },
         {
            trust: 0.2,
            url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/grfc7uapkaffh5wx3amdubvhlkyqa2nz/",
         },
         {
            trust: 0.2,
            url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/nqzmoshltbbiecennxa6m7dn5feed4ki/",
         },
         {
            trust: 0.2,
            url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/t5oum24zc43g4idt3jucihjtsdxjsk6y/",
         },
         {
            trust: 0.2,
            url: "https://wiki.ubuntu.com/securityteam/knowledgebase/srbds",
         },
         {
            trust: 0.1,
            url: "https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10318",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/459.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2020:2707",
         },
         {
            trust: 0.1,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-20-252-07",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://www.debian.org/security/faq",
         },
         {
            trust: 0.1,
            url: "https://www.debian.org/security/",
         },
         {
            trust: 0.1,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html",
         },
         {
            trust: 0.1,
            url: "https://security-tracker.debian.org/tracker/intel-microcode",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2021:3322",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2021:3027",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2021:3028",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2021:3029",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.20.04.0",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/4385-1",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.19.10.0",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.16.04.0",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.18.04.0",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/4393-1",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-12654",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-161977",
         },
         {
            db: "VULMON",
            id: "CVE-2020-0543",
         },
         {
            db: "PACKETSTORM",
            id: "168851",
         },
         {
            db: "PACKETSTORM",
            id: "163956",
         },
         {
            db: "PACKETSTORM",
            id: "163757",
         },
         {
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            db: "PACKETSTORM",
            id: "158005",
         },
         {
            db: "PACKETSTORM",
            id: "158010",
         },
         {
            db: "NVD",
            id: "CVE-2020-0543",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-161977",
         },
         {
            db: "VULMON",
            id: "CVE-2020-0543",
         },
         {
            db: "PACKETSTORM",
            id: "168851",
         },
         {
            db: "PACKETSTORM",
            id: "163956",
         },
         {
            db: "PACKETSTORM",
            id: "163757",
         },
         {
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            db: "PACKETSTORM",
            id: "158005",
         },
         {
            db: "PACKETSTORM",
            id: "158010",
         },
         {
            db: "NVD",
            id: "CVE-2020-0543",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-06-15T00:00:00",
            db: "VULHUB",
            id: "VHN-161977",
         },
         {
            date: "2020-06-15T00:00:00",
            db: "VULMON",
            id: "CVE-2020-0543",
         },
         {
            date: "2020-06-28T19:12:00",
            db: "PACKETSTORM",
            id: "168851",
         },
         {
            date: "2021-08-31T15:44:21",
            db: "PACKETSTORM",
            id: "163956",
         },
         {
            date: "2021-08-09T14:15:37",
            db: "PACKETSTORM",
            id: "163757",
         },
         {
            date: "2021-08-09T14:15:45",
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            date: "2021-08-10T14:49:53",
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            date: "2020-06-10T15:06:11",
            db: "PACKETSTORM",
            id: "158005",
         },
         {
            date: "2020-06-10T15:08:12",
            db: "PACKETSTORM",
            id: "158010",
         },
         {
            date: "2020-06-15T14:15:11.207000",
            db: "NVD",
            id: "CVE-2020-0543",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-28T00:00:00",
            db: "VULHUB",
            id: "VHN-161977",
         },
         {
            date: "2022-04-28T00:00:00",
            db: "VULMON",
            id: "CVE-2020-0543",
         },
         {
            date: "2024-11-21T04:53:42.440000",
            db: "NVD",
            id: "CVE-2020-0543",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "PACKETSTORM",
            id: "158005",
         },
         {
            db: "PACKETSTORM",
            id: "158010",
         },
      ],
      trust: 0.2,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Debian Security Advisory 4701-1",
      sources: [
         {
            db: "PACKETSTORM",
            id: "168851",
         },
      ],
      trust: 0.1,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "overflow, arbitrary, code execution",
      sources: [
         {
            db: "PACKETSTORM",
            id: "158010",
         },
      ],
      trust: 0.1,
   },
}

var-202106-0341
Vulnerability from variot

Improper initialization in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, 13.50.11 and 15.0.22 may allow a privileged user to potentially enable information disclosure via local access. Intel(R) CSME Contains an initialization vulnerability.Information may be obtained. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0341",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "13.0.47",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "13.30.17",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "14.1.53",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "14.5.32",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "12.0.81",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.12.86",
         },
         {
            model: "simatic ipc477e pro",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc647e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "13.50.11",
         },
         {
            model: "simatic ipc847e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.8.86",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "15.0.22",
         },
         {
            model: "simatic ipc677e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic ipc547g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc627e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.22.86",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc527g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "13.30.17",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "11.12.86",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "14.1.53",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "11.8.86",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "14.5.32",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "13.0.47",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "15.0.22",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: null,
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "13.50.11",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "11.22.86",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "12.0.81",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            db: "NVD",
            id: "CVE-2020-24507",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "12.0.81",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b360:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b365:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h310:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h370:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:mobile_cm246:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q370:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z390:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "12.0.81",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b360:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b365:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h310:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h370:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:mobile_cm246:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q370:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z390:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "13.0.47",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.0.47",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "13.30.17",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3_l13g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5_l16g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.30.17",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3_l13g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5_l16g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "14.1.53",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "14.1.53",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "14.5.32",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "14.5.32",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "11.8.86",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b150:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_m3-7y32:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h110:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h170:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q150:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q170:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z170:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "11.8.86",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b150:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b250:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m3-7y32:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h110:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h170:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q150:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q170:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q250:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z170:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "11.12.86",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c420:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "11.12.86",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c420:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "11.22.86",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c621a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "11.22.86",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c621a:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "13.50.11",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n4000c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n4020c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n5095:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_silver_a1030:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.50.11",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n4000c:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n4020c:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n5095:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_silver_a1030:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "15.0.22",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-11100b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11500b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900kb:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "15.0.22",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-11100b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11500b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900kb:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-24507",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens reported these vulnerabilities to CISA.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-560",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2020-24507",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "NONE",
                  baseScore: 2.1,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "CVE-2020-24507",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "LOW",
                  trust: 1.9,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.8,
                  id: "CVE-2020-24507",
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4.4,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-24507",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-24507",
                  trust: 1.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202106-560",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-24507",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-24507",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-560",
         },
         {
            db: "NVD",
            id: "CVE-2020-24507",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Improper initialization in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, 13.50.11 and 15.0.22 may allow a privileged user to potentially enable information disclosure via local access. Intel(R) CSME Contains an initialization vulnerability.Information may be obtained. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-24507",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2020-24507",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-24507",
            trust: 3.3,
         },
         {
            db: "SIEMENS",
            id: "SSA-309571",
            trust: 1.7,
         },
         {
            db: "JVN",
            id: "JVNVU99965981",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.1997",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021081109",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021061712",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-222-05",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-51731",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-560",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2020-24507",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-24507",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-560",
         },
         {
            db: "NVD",
            id: "CVE-2020-24507",
         },
      ],
   },
   id: "VAR-202106-0341",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5185185333333333,
   },
   last_update_date: "2022-05-04T08:07:35.391000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INTEL-SA-00459",
            trust: 0.8,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html",
         },
         {
            title: "Intel(R) CSME Repair measures for information disclosure vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=155255",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=240e27e5c8fba28153598a375a2a4130",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-24507",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-560",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-665",
            trust: 1,
         },
         {
            problemtype: "Improper initialization (CWE-665) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            db: "NVD",
            id: "CVE-2020-24507",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html",
         },
         {
            trust: 1.7,
            url: "https://security.netapp.com/advisory/ntap-20210611-0004/",
         },
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu99965981/",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-24507",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021081109",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-51731",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/intel-processor-multiple-vulnerabilities-via-csme-sps-lms-35670",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021061712",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.1997",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-222-05",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/665.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://cert-portal.siemens.com/productcert/txt/ssa-309571.txt",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-24507",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-560",
         },
         {
            db: "NVD",
            id: "CVE-2020-24507",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2020-24507",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-560",
         },
         {
            db: "NVD",
            id: "CVE-2020-24507",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-06-09T00:00:00",
            db: "VULMON",
            id: "CVE-2020-24507",
         },
         {
            date: "2022-03-18T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-06-08T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-560",
         },
         {
            date: "2021-06-09T19:15:00",
            db: "NVD",
            id: "CVE-2020-24507",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-08-10T00:00:00",
            db: "VULMON",
            id: "CVE-2020-24507",
         },
         {
            date: "2022-03-18T07:28:00",
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2022-04-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-560",
         },
         {
            date: "2022-04-22T16:20:00",
            db: "NVD",
            id: "CVE-2020-24507",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-560",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Intel(R) CSME  Initialization vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
}

var-201805-0963
Vulnerability from variot

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. CPU hardware utilizing speculative execution may be vulnerable to cache timing side-channel analysis. Two vulnerabilities are identified, known as "Variant 3a" and "Variant 4". CPUhardware is firmware that runs in the central processor for managing and controlling the CPU. Multiple CPUHardware information disclosure vulnerabilities. The vulnerability is caused by a race condition in the CPU cache processing. Local attackers can exploit vulnerabilities to obtain sensitive information through side channel analysis. AMD, ARM, and Intel CPUs are all CPU (central processing unit) products from different manufacturers. AMD, ARM, and Intel CPUs have security vulnerabilities. 7) - aarch64, noarch, ppc64le

  1. (CVE-2018-3639, aarch64)

  2. A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)

  3. A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)

Space precludes documenting all of the security fixes in this advisory. See the descriptions of the remaining security fixes in the related Knowledge Article:

https://access.redhat.com/articles/3658021

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. 1623067 - CVE-2018-9363 kernel: Buffer overflow in hidp_process_report 1629636 - CVE-2018-14641 kernel: a bug in ip_frag_reasm() can cause a crash in ip_do_fragment()

  1. (CVE-2018-3639, PowerPC)

  2. kernel: net/packet: overflow in check for priv area size (CVE-2017-7308)

  3. kernel: AIO interface didn't use rw_verify_area() for checking mandatory locking on files and size of access (CVE-2012-6701)

  4. kernel: AIO write triggers integer overflow in some protocols (CVE-2015-8830)

  5. kernel: Null pointer dereference via keyctl (CVE-2016-8650)

  6. kernel: ping socket / AF_LLC connect() sin_family race (CVE-2017-2671)

  7. kernel: Race condition between multiple sys_perf_event_open() calls (CVE-2017-6001)

  8. kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c (CVE-2017-7616)

  9. kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism (CVE-2017-7889)

  10. kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c (CVE-2017-8890)

  11. kernel: net: sctp_v6_create_accept_sk function mishandles inheritance (CVE-2017-9075)

  12. kernel: net: IPv6 DCCP implementation mishandles inheritance (CVE-2017-9076)

  13. kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance (CVE-2017-9077)

  14. kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190)

  15. kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121)

  16. kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203)

  17. kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash (CVE-2018-1130)

  18. kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service (CVE-2018-5803)

For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/):

869942 - Kernel crashes on reading an ACL containing 190 ACEs over NFSv4 1314275 - CVE-2015-8830 kernel: AIO write triggers integer overflow in some protocols 1314288 - CVE-2012-6701 kernel: AIO interface didn't use rw_verify_area() for checking mandatory locking on files and size of access 1395187 - CVE-2016-8650 kernel: Null pointer dereference via keyctl 1422825 - CVE-2017-6001 kernel: Race condition between multiple sys_perf_event_open() calls 1436649 - CVE-2017-2671 kernel: ping socket / AF_LLC connect() sin_family race 1437404 - CVE-2017-7308 kernel: net/packet: overflow in check for priv area size 1441088 - CVE-2017-7616 kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c 1444493 - CVE-2017-7889 kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism 1448170 - RHEL6.9: sunrpc reconnect logic now may trigger a SYN storm when a TCP connection drops and a burst of RPC commands hit the transport 1450972 - CVE-2017-8890 kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c 1452688 - CVE-2017-9076 kernel: net: IPv6 DCCP implementation mishandles inheritance 1452691 - CVE-2017-9075 kernel: net: sctp_v6_create_accept_sk function mishandles inheritance 1452744 - CVE-2017-9077 kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance 1495089 - CVE-2017-12190 kernel: memory leak when merging buffers in SCSI IO vectors 1497152 - systool causes panic on 2.6.32-696.6.3.el6.x86_64 using be2iscsi 1520893 - CVE-2017-15121 kernel: vfs: BUG in truncate_inode_pages_range() and fuse client 1550811 - CVE-2017-18203 kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service 1551051 - CVE-2018-5803 kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service 1560494 - i686: Using invpcid_flush_all_nonglobals() can cause user-space panic on .i686 1566890 - CVE-2018-3639 hw: cpu: speculative store bypass 1576419 - CVE-2018-1130 kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash

  1. 7) - aarch64, noarch, ppc64le, s390x

  2. Description:

The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. (CVE-2018-3639)

Note: This is the OpenJDK side of the CVE-2018-3639 mitigation.

The following packages have been upgraded to a later upstream version: rhevm-setup-plugins (3.6.7). Description:

KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.

Bug Fix(es):

  • Previously, using device passthrough for a SCSI-2 device failed and returned an "Illegal Request" error. With this update, the QEMU emulator checks the SCSI version of the device when performing passthrough. (BZ#1571370)

  • Under certain circumstances, resuming a paused guest generated redundant "VIR_DOMAIN_PAUSED_UNKNOWN" error messages in the libvirt log. This update corrects the event sending order when resuming guests, which prevents the errors being logged. (BZ#1588001)

  • Once all virtual machines have shut down, start them again for this update to take effect. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2018:2161-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2161 Issue date: 2018-07-10 CVE Names: CVE-2018-3639 ==================================================================== 1. Summary:

An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.3) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.3) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.3) - ppc64, ppc64le, x86_64

  1. Description:

The kernel packages contain the Linux kernel, the core of any Linux operating system.

Security Fix(es):

  • An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, x86 AMD)

Red Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.

Bug Fix(es):

  • When a Nonvolatile Memory Express (NVMe) namespace was created, changed, or deleted, an occasional deadlock occurred. With this update, namespace scanning and removal does not hold a mutual exclusion (mutex) program object. As a result, a deadlock no longer occurs in the described scenario. (BZ#1566886)

  • Previously, a live migration of a virtual machine from one host with updated firmware to another host without updated firmware resulted in incorrect kernel settings for Meltdown mitigations, which could leave the kernel vulnerable to Meltdown. With this fix, the firmware on the new physical host is re-scanned for updates after a live migration. As a result, the kernel uses the correct mitigation in the described scenario. (BZ#1570507)

  • Previously, microcode updates on 32 and 64-bit AMD and Intel architectures were not synchronized. As a consequence, it was not possible to apply the microcode updates. This fix adds the synchronization to the microcode updates so that processors of the stated architectures receive updates at the same time. As a result, microcode updates are now synchronized. (BZ#1578044)

  • When switching from the indirect branch speculation (IBRS) feature to the retpolines feature, the IBRS state of some CPUs was sometimes not handled correctly. Consequently, some CPUs were left with the IBRS Model-Specific Register (MSR) bit set to 1, which could lead to performance issues. With this update, the underlying source code has been fixed to clear the IBRS MSR bits correctly, thus fixing the bug. (BZ#1586146)

Users of kernel are advised to upgrade to these updated packages, which fix these bugs.

The system must be rebooted for this update to take effect.

  1. Solution:

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1566890 - CVE-2018-3639 hw: cpu: speculative store bypass

  1. Package List:

Red Hat Enterprise Linux ComputeNode EUS (v. 7.3):

Source: kernel-3.10.0-514.53.1.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-514.53.1.el7.noarch.rpm kernel-doc-3.10.0-514.53.1.el7.noarch.rpm

x86_64: kernel-3.10.0-514.53.1.el7.x86_64.rpm kernel-debug-3.10.0-514.53.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-514.53.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.53.1.el7.x86_64.rpm kernel-devel-3.10.0-514.53.1.el7.x86_64.rpm kernel-headers-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-514.53.1.el7.x86_64.rpm perf-3.10.0-514.53.1.el7.x86_64.rpm perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm python-perf-3.10.0-514.53.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm

Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3):

x86_64: kernel-debug-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-514.53.1.el7.x86_64.rpm perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server EUS (v. 7.3):

Source: kernel-3.10.0-514.53.1.el7.src.rpm

noarch: kernel-abi-whitelists-3.10.0-514.53.1.el7.noarch.rpm kernel-doc-3.10.0-514.53.1.el7.noarch.rpm

ppc64: kernel-3.10.0-514.53.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-514.53.1.el7.ppc64.rpm kernel-debug-3.10.0-514.53.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-514.53.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-514.53.1.el7.ppc64.rpm kernel-devel-3.10.0-514.53.1.el7.ppc64.rpm kernel-headers-3.10.0-514.53.1.el7.ppc64.rpm kernel-tools-3.10.0-514.53.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-514.53.1.el7.ppc64.rpm perf-3.10.0-514.53.1.el7.ppc64.rpm perf-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm python-perf-3.10.0-514.53.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm

ppc64le: kernel-3.10.0-514.53.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-514.53.1.el7.ppc64le.rpm kernel-debug-3.10.0-514.53.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-514.53.1.el7.ppc64le.rpm kernel-devel-3.10.0-514.53.1.el7.ppc64le.rpm kernel-headers-3.10.0-514.53.1.el7.ppc64le.rpm kernel-tools-3.10.0-514.53.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-514.53.1.el7.ppc64le.rpm perf-3.10.0-514.53.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm python-perf-3.10.0-514.53.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm

s390x: kernel-3.10.0-514.53.1.el7.s390x.rpm kernel-debug-3.10.0-514.53.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-514.53.1.el7.s390x.rpm kernel-debug-devel-3.10.0-514.53.1.el7.s390x.rpm kernel-debuginfo-3.10.0-514.53.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-514.53.1.el7.s390x.rpm kernel-devel-3.10.0-514.53.1.el7.s390x.rpm kernel-headers-3.10.0-514.53.1.el7.s390x.rpm kernel-kdump-3.10.0-514.53.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-514.53.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-514.53.1.el7.s390x.rpm perf-3.10.0-514.53.1.el7.s390x.rpm perf-debuginfo-3.10.0-514.53.1.el7.s390x.rpm python-perf-3.10.0-514.53.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-514.53.1.el7.s390x.rpm

x86_64: kernel-3.10.0-514.53.1.el7.x86_64.rpm kernel-debug-3.10.0-514.53.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-514.53.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.53.1.el7.x86_64.rpm kernel-devel-3.10.0-514.53.1.el7.x86_64.rpm kernel-headers-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-514.53.1.el7.x86_64.rpm perf-3.10.0-514.53.1.el7.x86_64.rpm perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm python-perf-3.10.0-514.53.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm

Red Hat Enterprise Linux Server Optional EUS (v. 7.3):

ppc64: kernel-debug-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-514.53.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-514.53.1.el7.ppc64.rpm perf-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm

ppc64le: kernel-debug-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-514.53.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-514.53.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-514.53.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm

x86_64: kernel-debug-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-514.53.1.el7.x86_64.rpm perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2018-3639 https://access.redhat.com/security/updates/classification/#important

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBW0Tt1NzjgjWX9erEAQjWjRAAqEnkLg83IXcDh/QVNDhAoM5gAh+OkfHJ LiuDz6CIHgDiv9K3BiG/dLNgL5caK11pxryqk/9kmtgoy6ClyqcrA2FNRIJMwugr PXTjAXNxekyn6gTX0I+8hSOulCZtkCRXmlUu79apvVT/eqQM6PfqjK02OjEL9uc8 59jO7ZoWcv7GVJhu+06QoHaWAqGHBOYL9ufCVAXZH6dY3aS2dPM4UUcZpVxsP8X/ HqXR/ciyXNPSQoGcR/waf/iZgx1pDIV6JXmdl/qlJXthohwa1ZwxD2qqEV3cM9uO XzXXVu9SD2D8cU4jClzIZ+XfM9J9dNl8j2YbZHaUs5IADNwqAIjPTb5leNhe6jqv omnbgOwkJ0mEOLeWBSpQhGxoq4rk4eUJLai1kcpw8MRa6RzOzTs+GHOxTpDfL681 S7F8GjN6J4l0gbW+fOkley3gdMi/74cZcWA6jX/GcjJrtzhlFhRsUDZqd8Eb+F/g quqdBLQ9Vc81FRlMoCATOhuqHM1/eJUcySbY3r1A6bU9oUQShN+prvIV4z5/ag6o WIPN2ImSDaSBACJoCSEby8e2jXs689JLHgPPS0QVvuMQK7wdYGu8/7W++L7+5/It IkS2XQFetG9urfkgM/OMVzeybOiGVsai+JAJOTxFnTWPeyIFF5MJ2E31Q11Amdlp YF80GD/Rvjo=ltf/ -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Relevant releases/architectures:

RHV-M 4.3 - noarch

  1. It includes the configuration of the Red Hat Support plugin, copying downstream-only artifacts to the ISO domain, and links to the knowledgebase and other support material. There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue. (CVE-2017-5754)

Bug Fix(es):

  • [CVE-2017-5754] Variant3: POWER {qemu-kvm-rhev} Add machine type variants (BZ#1559948)

  • add POWER 9 to the 4.2 cluster level (BZ#1574494)

  • 6.6) - x86_64

  • Description:

The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201805-0963",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "atom c",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: "c3808",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: "c3508",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: "c3538",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: "c3558",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: "c3708",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: "c3750",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: "c3758",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: "c2308",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: "c3308",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: "c3338",
         },
         {
            model: "xeon e5 2650l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4610_v4",
         },
         {
            model: "xeon e3 1240l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4627_v4",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4660_v3",
         },
         {
            model: "enterprise linux server tus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.6",
         },
         {
            model: "xeon e5 2430l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1240 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8860_v3",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3736g",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8893_v3",
         },
         {
            model: "xeon e3 1225 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4860_v2",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "45nm",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3775",
         },
         {
            model: "windows 10",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "1809",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86130t",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3850",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86126t",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1545m_v5",
         },
         {
            model: "xeon e5 2637",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4807",
         },
         {
            model: "cortex-a",
            scope: "eq",
            trust: 1,
            vendor: "arm",
            version: "15",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3480",
         },
         {
            model: "simatic ipc827d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.02.11",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3745",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3580",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x3480",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8870_v3",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5504",
         },
         {
            model: "xeon e3 1278l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4830",
         },
         {
            model: "simatic ipc427e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.09",
         },
         {
            model: "windows 7",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8880l_v2",
         },
         {
            model: "jetson tx2",
            scope: "lt",
            trust: 1,
            vendor: "nvidia",
            version: "r28.3",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8160",
         },
         {
            model: "xeon e3 1265l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2430 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1280 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4109t",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4667_v3",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8860_v4",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8891_v2",
         },
         {
            model: "xeon e5 2603 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "cortex-a",
            scope: "eq",
            trust: 1,
            vendor: "arm",
            version: "57",
         },
         {
            model: "xeon e5 2620 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5507",
         },
         {
            model: "xeon e3 1281 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2660",
         },
         {
            model: "xeon e5 2450l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.0",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8893_v2",
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "17.10",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2699_v3",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4820",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3735d",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8867l",
         },
         {
            model: "xeon e5 2630 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "windows server 2012",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8180",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2650l_v4",
         },
         {
            model: "xeon e3 1225 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2420",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2690_v2",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.0",
         },
         {
            model: "xeon e5 2648l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4850_v3",
         },
         {
            model: "celeron j",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "j3455",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "w5580",
         },
         {
            model: "mivoice border gateway",
            scope: "eq",
            trust: 1,
            vendor: "mitel",
            version: null,
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86134m",
         },
         {
            model: "surface",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "mivoic mx-one",
            scope: "eq",
            trust: 1,
            vendor: "mitel",
            version: null,
         },
         {
            model: "xeon e5 2438l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z2480",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86144",
         },
         {
            model: "xeon e5 2470 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom x5-e3930",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc547e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "r1.30.0",
         },
         {
            model: "windows server 2016",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "1803",
         },
         {
            model: "xeon e5 2407 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2450 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2609 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.4",
         },
         {
            model: "windows server 2008",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "sp2",
         },
         {
            model: "xeon e5 2609 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4650_v3",
         },
         {
            model: "simatic ipc647c",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "15.01.14",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2690_v3",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l5508_",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1515m_v5",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86126",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86132",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4640",
         },
         {
            model: "xeon e3 1245",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2418l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2643 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86142m",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4620",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2660_v2",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1535m_v5",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2687w_v2",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "85120",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "3600",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86134",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "85120t",
         },
         {
            model: "pentium silver",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n5000",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3785",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x5550",
         },
         {
            model: "xeon silver",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4114",
         },
         {
            model: "atom e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e3827",
         },
         {
            model: "simatic ipc827c",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "15.02.15",
         },
         {
            model: "xeon e5 1428l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2670_v3",
         },
         {
            model: "xeon e5 2430",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8870_v2",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4890_v2",
         },
         {
            model: "xeon e5 2428l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2640 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2667",
         },
         {
            model: "xeon e5 2618l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2643 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4850",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4603_v2",
         },
         {
            model: "celeron j",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "j4105",
         },
         {
            model: "simatic ipc427d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "17.0x.14",
         },
         {
            model: "enterprise linux server tus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.7",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4880_v2",
         },
         {
            model: "itc1500 pro",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "3.1",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8176f",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1565l_v5",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4648_v3",
         },
         {
            model: "xeon e5 1660 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "ruggedcom ape",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8857_v2",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8837",
         },
         {
            model: "xeon e5 2620",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1505l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4628l_v4",
         },
         {
            model: "xeon e5 2618l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "85115",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 1,
            vendor: "oracle",
            version: "11",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4603",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2665",
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "32nm",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2687w_v4",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8880_v2",
         },
         {
            model: "xeon e5 2630 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4830_v4",
         },
         {
            model: "xeon e3 1265l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 1650",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4650_v2",
         },
         {
            model: "pentium silver",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "j5005",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3570",
         },
         {
            model: "xeon e5 1680 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3560",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2850",
         },
         {
            model: "enterprise linux server tus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.2",
         },
         {
            model: "sonicosv",
            scope: "eq",
            trust: 1,
            vendor: "sonicwall",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8890_v2",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5520",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8160f",
         },
         {
            model: "email security",
            scope: "eq",
            trust: 1,
            vendor: "sonicwall",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8891_v4",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4624l_v2",
         },
         {
            model: "xeon e5 1650 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1268l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4650_v4",
         },
         {
            model: "openstack",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "9",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z2520",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "85119t",
         },
         {
            model: "xeon e5 2608l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "itc2200",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "3.1",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2803",
         },
         {
            model: "xeon e5 2643 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4607_v2",
         },
         {
            model: "xeon e5 1620 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "secure mobile access",
            scope: "eq",
            trust: 1,
            vendor: "sonicwall",
            version: null,
         },
         {
            model: "xeon e5 2637 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2630l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3770",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4607",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3955",
         },
         {
            model: "xeon e3 1270 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3530",
         },
         {
            model: "xeon e5 2630l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z2460",
         },
         {
            model: "xeon e3 1220 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1230 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86146",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5506",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8158",
         },
         {
            model: "simatic ipc677d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.02.11",
         },
         {
            model: "cloud global management system",
            scope: "eq",
            trust: 1,
            vendor: "sonicwall",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4820_v2",
         },
         {
            model: "core i7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "32nm",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1585l_v5",
         },
         {
            model: "xeon e5 2408l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4116t",
         },
         {
            model: "enterprise linux eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.7",
         },
         {
            model: "xeon e5 1650 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "surface pro with lte advanced",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "1807",
         },
         {
            model: "windows server 2016",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "simatic ipc477e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.09",
         },
         {
            model: "xeon e3 1275 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2680_v2",
         },
         {
            model: "xeon e3 1240 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4655_v4",
         },
         {
            model: "simatic ipc847c",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "15.01.14",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x5560",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2667_v2",
         },
         {
            model: "enterprise linux eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.5",
         },
         {
            model: "atom e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e3845",
         },
         {
            model: "xeon e3 1280 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "18.04",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4650",
         },
         {
            model: "xeon e5 2637 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4627_v2",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2667_v4",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2820",
         },
         {
            model: "mivoice business",
            scope: "eq",
            trust: 1,
            vendor: "mitel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4870_v2",
         },
         {
            model: "xeon e5 2630l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8168",
         },
         {
            model: "xeon e3 1241 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86142",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8160m",
         },
         {
            model: "xeon e3 1230l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1260l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "virtualization manager",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "4.3",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4655_v3",
         },
         {
            model: "xeon e3 1225",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "windows 10",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "1709",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4830_v3",
         },
         {
            model: "xeon e3 1271 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1260l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "itc2200 pro",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "3.1",
         },
         {
            model: "xeon e3 1245 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l5506",
         },
         {
            model: "xeon e5 1650 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z2760",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l3406",
         },
         {
            model: "xeon e3 1245 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1275 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1230",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "jetson tx1",
            scope: "lt",
            trust: 1,
            vendor: "nvidia",
            version: "r28.3",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l3403",
         },
         {
            model: "xeon e5 2623 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2650",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4620_v2",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2695_v2",
         },
         {
            model: "xeon e3 1240 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2658",
         },
         {
            model: "xeon e3 1285 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x3440",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2687w_v3",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x3460",
         },
         {
            model: "xeon e5 2628l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2698_v3",
         },
         {
            model: "xeon e5 2630 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86128",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86148f",
         },
         {
            model: "local service management system",
            scope: "gte",
            trust: 1,
            vendor: "oracle",
            version: "13.0",
         },
         {
            model: "pentium",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n4000",
         },
         {
            model: "core m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "45nm",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3590",
         },
         {
            model: "xeon e5 1428l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "micloud management portal",
            scope: "eq",
            trust: 1,
            vendor: "mitel",
            version: "*",
         },
         {
            model: "surface pro",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "1796",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8890_v3",
         },
         {
            model: "xeon e5 2448l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2428l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3745d",
         },
         {
            model: "enterprise linux desktop",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.0",
         },
         {
            model: "struxureware data center expert",
            scope: "lt",
            trust: 1,
            vendor: "schneider electric",
            version: "7.6.0",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z2560",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2860",
         },
         {
            model: "xeon e5 2637 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2697_v3",
         },
         {
            model: "xeon e3 1285l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3958",
         },
         {
            model: "simatic ipc547g",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "r1.23.0",
         },
         {
            model: "xeon e5 2418l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e3805",
         },
         {
            model: "atom e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e3825",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3770d",
         },
         {
            model: "windows 10",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "1607",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2850_v2",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8153",
         },
         {
            model: "xeon e5 2603 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.6",
         },
         {
            model: "micollab",
            scope: "eq",
            trust: 1,
            vendor: "mitel",
            version: null,
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8170",
         },
         {
            model: "xeon e3 1286l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 1660 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n4100",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5115",
         },
         {
            model: "xeon e3 12201 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1280",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2640 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2643",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2620 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "windows server 2008",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "r2",
         },
         {
            model: "virtualization",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "4.0",
         },
         {
            model: "enterprise linux server tus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.6",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8893_v4",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5503",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4830_v2",
         },
         {
            model: "xeon e3 1285 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron j",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "j4005",
         },
         {
            model: "atom e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e3826",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2658_v4",
         },
         {
            model: "xeon e3 1225 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "windows 10",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "1703",
         },
         {
            model: "xeon e3 1240l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3460",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2670",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2695_v3",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4809_v2",
         },
         {
            model: "atom x7-e3950",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2430l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2667_v3",
         },
         {
            model: "openstack",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "12",
         },
         {
            model: "xeon e5 2448l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2407",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4820_v3",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4640_v2",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x3430",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8867_v3",
         },
         {
            model: "xeon e3 1270 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1268l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86138f",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4620_v3",
         },
         {
            model: "xeon e3 1501m v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2618l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2670_v2",
         },
         {
            model: "xeon e3 1220 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x3470",
         },
         {
            model: "xeon e5 2603 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc477e pro",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.09",
         },
         {
            model: "xeon e3 1245 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2450l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4860",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8160t",
         },
         {
            model: "xeon e3 1225 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 1620 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4112",
         },
         {
            model: "xeon e3 1276 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1558l_v5",
         },
         {
            model: "xeon e3 1505m v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4108",
         },
         {
            model: "enterprise linux eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.6",
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "12.04",
         },
         {
            model: "web application firewall",
            scope: "eq",
            trust: 1,
            vendor: "sonicwall",
            version: null,
         },
         {
            model: "xeon e5 2650l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2699r_v4",
         },
         {
            model: "atom e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e3815",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2698_v4",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l5518_",
         },
         {
            model: "xeon e5 1620",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "w5590",
         },
         {
            model: "enterprise linux server tus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.3",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4610",
         },
         {
            model: "xeon e3 1220l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1230 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2660_v3",
         },
         {
            model: "xeon e3 1235l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1578l_v5",
         },
         {
            model: "xeon e3 1226 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1535m_v6",
         },
         {
            model: "xeon e5 1428l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.4",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3740d",
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "45nm",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2687w",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2697_v4",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "125c_",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86142f",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86154",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8870_v4",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8164",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2658a_v3",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2690",
         },
         {
            model: "xeon e5 2648l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2603",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1275 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4640_v3",
         },
         {
            model: "sinema remote connect",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86140",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.7",
         },
         {
            model: "xeon e5 2628l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4116",
         },
         {
            model: "xeon e3 1285 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4669_v4",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86138",
         },
         {
            model: "openstack",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "8",
         },
         {
            model: "xeon e3 12201",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2660_v4",
         },
         {
            model: "xeon e5 2418l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic field pg m5",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "22.01.06",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2680_v3",
         },
         {
            model: "simatic ipc677c",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "15.02.15",
         },
         {
            model: "surface pro",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "3",
         },
         {
            model: "xeon e5 1630 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "45nm",
         },
         {
            model: "xeon e5 2450",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86136",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2699a_v4",
         },
         {
            model: "xeon e5 2403",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "openstack",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "13",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e6550",
         },
         {
            model: "enterprise linux eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.3",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.2",
         },
         {
            model: "windows server 2016",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "1709",
         },
         {
            model: "xeon e3 1270 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1,
            vendor: "debian",
            version: "8.0",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1585_v5",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3735g",
         },
         {
            model: "xeon e5 2403 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1501l v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2440",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.0",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4610_v2",
         },
         {
            model: "pentium j",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "j4205",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z2580",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3735e",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8830",
         },
         {
            model: "surface book",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1220_",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8880_v4",
         },
         {
            model: "surface studio",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3950",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1,
            vendor: "debian",
            version: "9.0",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2697a_v4",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2870_v2",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4870",
         },
         {
            model: "simatic ipc847d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.01.14",
         },
         {
            model: "xeon e3 1245 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2658_v3",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "7500",
         },
         {
            model: "xeon e5 1630 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "enterprise linux server tus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.4",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3736f",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4667_v4",
         },
         {
            model: "itc1900 pro",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "3.1",
         },
         {
            model: "xeon e5 2470",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "openstack",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "10",
         },
         {
            model: "surface pro",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "4",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4809_v3",
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "14.04",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4640_v4",
         },
         {
            model: "xeon e5 2648l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "sinumerik pcu 50.5",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "15.02.15",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2683_v3",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l5530",
         },
         {
            model: "xeon e3 1220 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-1105c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "sinumerik 840 d sl",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "xeon e3 1258l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4620_v4",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4669_v3",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3740",
         },
         {
            model: "simatic itp1000",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "23.01.04",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3858",
         },
         {
            model: "xeon e3 1235",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2650l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4650l",
         },
         {
            model: "xeon e3 1270 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simotion p320-4e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "17.0x.14",
         },
         {
            model: "xeon e5 2640 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1575m_v5",
         },
         {
            model: "xeon e3 1220 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8890_v4",
         },
         {
            model: "xeon e5 2609 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x3450",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8860",
         },
         {
            model: "simatic ipc477c",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l3426",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86152",
         },
         {
            model: "enterprise linux server",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.0",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "5.9",
         },
         {
            model: "xeon e5 1620 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2630l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1275_",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5540",
         },
         {
            model: "xeon silver",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4110",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2890_v2",
         },
         {
            model: "xeon e5 1660 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2699_v4",
         },
         {
            model: "open integration gateway",
            scope: "eq",
            trust: 1,
            vendor: "mitel",
            version: null,
         },
         {
            model: "xeon e3 1240 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc477d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "17.0x.14",
         },
         {
            model: "simatic et 200 sp",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "2.6",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8891_v3",
         },
         {
            model: "enterprise linux eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.4",
         },
         {
            model: "xeon e5 2420 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86130",
         },
         {
            model: "windows 10",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "1803",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8850_v2",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8176m",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86140m",
         },
         {
            model: "xeon e3 1265l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3775d",
         },
         {
            model: "xeon e3 1246 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "virtualization manager",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "4.2",
         },
         {
            model: "local service management system",
            scope: "lte",
            trust: 1,
            vendor: "oracle",
            version: "13.3",
         },
         {
            model: "xeon e3 1275l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2650 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86148",
         },
         {
            model: "xeon e5 2623 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4809_v4",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4657l_v2",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2690_v4",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z2420",
         },
         {
            model: "openstack",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.0",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8880l_v3",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8850",
         },
         {
            model: "xeon e3 1275 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom x5-e3940",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1285l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8867_v4",
         },
         {
            model: "xeon e3 1280 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86138t",
         },
         {
            model: "simatic ipc427c",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "core i3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "32nm",
         },
         {
            model: "simatic ipc347e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1.5",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e6510",
         },
         {
            model: "atom c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "c3830",
         },
         {
            model: "xeon e5 1660",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2428l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "sinumerik tcu 30.3",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "mivoice connect",
            scope: "eq",
            trust: 1,
            vendor: "mitel",
            version: null,
         },
         {
            model: "windows 8.1",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "xeon e5 2630",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc627d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.02.11",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8880_v3",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4850_v4",
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "16.04",
         },
         {
            model: "windows server 2012",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "r2",
         },
         {
            model: "xeon e3 1230 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2650 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic s7-1500",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "2.6",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2695_v4",
         },
         {
            model: "xeon e5 2440 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4850_v2",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2680_v4",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.5",
         },
         {
            model: "mivoice 5000",
            scope: "eq",
            trust: 1,
            vendor: "mitel",
            version: null,
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "1505m_v6",
         },
         {
            model: "itc1500",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "3.1",
         },
         {
            model: "xeon e5 2648l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "85122",
         },
         {
            model: "xeon e3 1290 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 1680 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1125c v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8170m",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4820_v4",
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8156",
         },
         {
            model: "xeon e3 1231 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8176",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2830",
         },
         {
            model: "xeon e3 1505l v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2628l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8870",
         },
         {
            model: "cortex-a",
            scope: "eq",
            trust: 1,
            vendor: "arm",
            version: "72",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "8894_v4",
         },
         {
            model: "xeon e3 1230 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2609",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2650 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2870",
         },
         {
            model: "simatic ipc3000 smart",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1.5",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2680",
         },
         {
            model: "xeon e5 2640",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5502",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4617",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e6540",
         },
         {
            model: "simatic ipc647d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.01.14",
         },
         {
            model: "xeon e3 1280 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1270",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n4200",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "e5530",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4610_v3",
         },
         {
            model: "xeon e3 1105c v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4114t",
         },
         {
            model: "simatic field pg m4",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "18.01.09",
         },
         {
            model: "itc1900",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "3.1",
         },
         {
            model: "simatic ipc627c",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "15.02.15",
         },
         {
            model: "core m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "32nm",
         },
         {
            model: "global management system",
            scope: "eq",
            trust: 1,
            vendor: "sonicwall",
            version: null,
         },
         {
            model: "xeon e3 1286 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3 1290",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "n3450",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2658_v2",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4660_v4",
         },
         {
            model: "enterprise linux server aus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "7.3",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "x5570",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86150",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "l5520",
         },
         {
            model: "mrg realtime",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "2.0",
         },
         {
            model: "xeon e7",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2880_v2",
         },
         {
            model: "windows 10",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: null,
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2697_v2",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "4627_v3",
         },
         {
            model: "enterprise linux workstation",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.0",
         },
         {
            model: "xeon e3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "5600",
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3795",
         },
         {
            model: "enterprise linux eus",
            scope: "eq",
            trust: 1,
            vendor: "redhat",
            version: "6.7",
         },
         {
            model: "xeon e5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "2683_v4",
         },
         {
            model: "xeon e3 1240",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e5 2620 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "surface book",
            scope: "eq",
            trust: 1,
            vendor: "microsoft",
            version: "2",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86130f",
         },
         {
            model: "xeon e5 2608l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "atom z",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "z3735f",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "86126f",
         },
         {
            model: "xeon gold",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: "85118",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "amd",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "arm",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "apple",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "cisco",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "dell",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "dell emc",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "fortinet",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "hp",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "hitachi",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "ibm",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "intel",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "microsoft",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "qualcomm incorporated",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "red hat",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "suse linux",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "synology",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "ubuntu",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "vmware",
            version: null,
         },
         {
            model: "cortex a57",
            scope: null,
            trust: 0.6,
            vendor: "arm",
            version: null,
         },
         {
            model: "5th generation core processors",
            scope: null,
            trust: 0.6,
            vendor: "intel",
            version: null,
         },
         {
            model: "cortex a72",
            scope: null,
            trust: 0.6,
            vendor: "arm",
            version: null,
         },
         {
            model: "6th generation core processors",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "5th generation core processors",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "4th generation core processors",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "3rd generation core processors",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "2nd generation core processors",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "8th generation core processors",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "7th generation core processors",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "atom processor a series",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "atom processor c series",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "atom processor e series",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "atom processor t series",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "atom processor series",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "x0",
         },
         {
            model: "atom processor z series",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "core x-series processor family for intel platforms",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "x990",
         },
         {
            model: "celeron processor j series",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "celeron processor n series",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "core m processor family",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "core x-series processor family for intel platforms",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "x2990",
         },
         {
            model: "pentium processor n series",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "pentium processor silver series",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "xeon processor series",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "34000",
         },
         {
            model: "xeon processor series",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "36000",
         },
         {
            model: "xeon processor series",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "55000",
         },
         {
            model: "xeon processor series",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "56000",
         },
         {
            model: "xeon processor series",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "75000",
         },
         {
            model: "xeon processor series",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "65000",
         },
         {
            model: "pentium processor j series",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "xeon processor e3 family",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "xeon processor e3 family",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "v20",
         },
         {
            model: "xeon processor e3 family",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "v3",
         },
         {
            model: "xeon processor e3 family",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "v40",
         },
         {
            model: "xeon processor e3 family",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "v50",
         },
         {
            model: "xeon processor e3 family",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "v60",
         },
         {
            model: "xeon processor e5 family",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "xeon processor e5 family",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "v20",
         },
         {
            model: "xeon processor e5 family",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "v3",
         },
         {
            model: "xeon processor e5 family",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "v40",
         },
         {
            model: "xeon processor e7 family",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "0",
         },
         {
            model: "xeon processor e7 family",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "v20",
         },
         {
            model: "xeon processor e7 family",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "v3",
         },
         {
            model: "xeon processor e7 family",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "v40",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#180049",
         },
         {
            db: "CNVD",
            id: "CNVD-2018-13391",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201805-749",
         },
         {
            db: "NVD",
            id: "CVE-2018-3639",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Red Hat",
      sources: [
         {
            db: "PACKETSTORM",
            id: "147778",
         },
         {
            db: "PACKETSTORM",
            id: "150070",
         },
         {
            db: "PACKETSTORM",
            id: "148244",
         },
         {
            db: "PACKETSTORM",
            id: "151288",
         },
         {
            db: "PACKETSTORM",
            id: "150075",
         },
         {
            db: "PACKETSTORM",
            id: "147738",
         },
         {
            db: "PACKETSTORM",
            id: "147758",
         },
         {
            db: "PACKETSTORM",
            id: "148330",
         },
         {
            db: "PACKETSTORM",
            id: "148484",
         },
         {
            db: "PACKETSTORM",
            id: "152767",
         },
         {
            db: "PACKETSTORM",
            id: "150077",
         },
         {
            db: "PACKETSTORM",
            id: "147748",
         },
      ],
      trust: 1.2,
   },
   cve: "CVE-2018-3639",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 2.1,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "CVE-2018-3639",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "LOW",
                  trust: 1,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.9,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  id: "CNVD-2018-13391",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.6,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4.9,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  id: "VHN-133670",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:L/AC:L/AU:N/C:C/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4.7,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.4,
                  id: "VHN-133671",
                  impactScore: 6.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:L/AC:M/AU:N/C:C/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2018-3639",
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2018-3639",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2018-13391",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201805-749",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-133670",
                  trust: 0.1,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-133671",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-13391",
         },
         {
            db: "VULHUB",
            id: "VHN-133670",
         },
         {
            db: "VULHUB",
            id: "VHN-133671",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201805-749",
         },
         {
            db: "NVD",
            id: "CVE-2018-3639",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. CPU hardware utilizing speculative execution may be vulnerable to cache timing side-channel analysis. Two vulnerabilities are identified, known as \"Variant 3a\" and \"Variant 4\". CPUhardware is firmware that runs in the central processor for managing and controlling the CPU. Multiple CPUHardware information disclosure vulnerabilities. The vulnerability is caused by a race condition in the CPU cache processing. Local attackers can exploit vulnerabilities to obtain sensitive information through side channel analysis. AMD, ARM, and Intel CPUs are all CPU (central processing unit) products from different manufacturers. AMD, ARM, and Intel CPUs have security vulnerabilities. 7) - aarch64, noarch, ppc64le\n\n3. (CVE-2018-3639, aarch64)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled\nspecially crafted TCP packets. A remote attacker could use this flaw to\ntrigger time and calculation expensive calls to tcp_collapse_ofo_queue()\nand tcp_prune_ofo_queue() functions by sending specially modified packets\nwithin ongoing TCP sessions which could lead to a CPU saturation and hence\na denial of service on the system. Maintaining the denial of service\ncondition requires continuous two-way TCP sessions to a reachable open\nport, thus the attacks cannot be performed using spoofed IP addresses. \n(CVE-2018-5390)\n\n* A flaw named FragmentSmack was found in the way the Linux kernel handled\nreassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use\nthis flaw to trigger time and calculation expensive fragment reassembly\nalgorithm by sending specially crafted packets which could lead to a CPU\nsaturation and hence a denial of service on the system. (CVE-2018-5391)\n\nSpace precludes documenting all of the security fixes in this advisory. See\nthe descriptions of the remaining security fixes in the related Knowledge\nArticle:\n\nhttps://access.redhat.com/articles/3658021\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. \n1623067 - CVE-2018-9363 kernel: Buffer overflow in hidp_process_report\n1629636 - CVE-2018-14641 kernel: a bug in ip_frag_reasm() can cause a crash in ip_do_fragment()\n\n6. (CVE-2018-3639, PowerPC)\n\n* kernel: net/packet: overflow in check for priv area size (CVE-2017-7308)\n\n* kernel: AIO interface didn't use rw_verify_area() for checking mandatory\nlocking on files and size of access (CVE-2012-6701)\n\n* kernel: AIO write triggers integer overflow in some protocols\n(CVE-2015-8830)\n\n* kernel: Null pointer dereference via keyctl (CVE-2016-8650)\n\n* kernel: ping socket / AF_LLC connect() sin_family race (CVE-2017-2671)\n\n* kernel: Race condition between multiple sys_perf_event_open() calls\n(CVE-2017-6001)\n\n* kernel: Incorrect error handling in the set_mempolicy and mbind compat\nsyscalls in mm/mempolicy.c (CVE-2017-7616)\n\n* kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM\nprotection mechanism (CVE-2017-7889)\n\n* kernel: Double free in the inet_csk_clone_lock function in\nnet/ipv4/inet_connection_sock.c (CVE-2017-8890)\n\n* kernel: net: sctp_v6_create_accept_sk function mishandles inheritance\n(CVE-2017-9075)\n\n* kernel: net: IPv6 DCCP implementation mishandles inheritance\n(CVE-2017-9076)\n\n* kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance\n(CVE-2017-9077)\n\n* kernel: memory leak when merging buffers in SCSI IO vectors\n(CVE-2017-12190)\n\n* kernel: vfs: BUG in truncate_inode_pages_range() and fuse client\n(CVE-2017-15121)\n\n* kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows\nlocal users to cause a denial of service (CVE-2017-18203)\n\n* kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit()\nleads to a system crash (CVE-2018-1130)\n\n* kernel: Missing length check of payload in\nnet/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of\nservice (CVE-2018-5803)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. Bugs fixed (https://bugzilla.redhat.com/):\n\n869942 - Kernel crashes on reading an ACL containing 190 ACEs over NFSv4\n1314275 - CVE-2015-8830 kernel: AIO write triggers integer overflow in some protocols\n1314288 - CVE-2012-6701 kernel: AIO interface didn't use rw_verify_area() for checking mandatory locking on files and size of access\n1395187 - CVE-2016-8650 kernel: Null pointer dereference via keyctl\n1422825 - CVE-2017-6001 kernel: Race condition between multiple sys_perf_event_open() calls\n1436649 - CVE-2017-2671 kernel: ping socket / AF_LLC connect() sin_family race\n1437404 - CVE-2017-7308 kernel: net/packet: overflow in check for priv area size\n1441088 - CVE-2017-7616 kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c\n1444493 - CVE-2017-7889 kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism\n1448170 - RHEL6.9: sunrpc reconnect logic now may trigger a SYN storm when a TCP connection drops and a burst of RPC commands hit the transport\n1450972 - CVE-2017-8890 kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c\n1452688 - CVE-2017-9076 kernel: net: IPv6 DCCP implementation mishandles inheritance\n1452691 - CVE-2017-9075 kernel: net: sctp_v6_create_accept_sk function mishandles inheritance\n1452744 - CVE-2017-9077 kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance\n1495089 - CVE-2017-12190 kernel: memory leak when merging buffers in SCSI IO vectors\n1497152 - systool causes panic on 2.6.32-696.6.3.el6.x86_64 using be2iscsi\n1520893 - CVE-2017-15121 kernel: vfs: BUG in truncate_inode_pages_range() and fuse client\n1550811 - CVE-2017-18203 kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service\n1551051 - CVE-2018-5803 kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service\n1560494 - i686: Using invpcid_flush_all_nonglobals() can cause user-space panic on .i686\n1566890 - CVE-2018-3639 hw: cpu: speculative store bypass\n1576419 - CVE-2018-1130 kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash\n\n6. 7) - aarch64, noarch, ppc64le, s390x\n\n3. Description:\n\nThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime\nEnvironment and the OpenJDK 8 Java Software Development Kit. (CVE-2018-3639)\n\nNote: This is the OpenJDK side of the CVE-2018-3639 mitigation. \n\nThe following packages have been upgraded to a later upstream version:\nrhevm-setup-plugins (3.6.7). Description:\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on a variety of architectures. The qemu-kvm-rhev packages provide the\nuser-space component for running virtual machines that use KVM in\nenvironments managed by Red Hat products. \n\nBug Fix(es):\n\n* Previously, using device passthrough for a SCSI-2 device failed and\nreturned an \"Illegal Request\" error. With this update, the QEMU emulator\nchecks the SCSI version of the device when performing passthrough. (BZ#1571370)\n \n* Under certain circumstances, resuming a paused guest generated redundant\n\"VIR_DOMAIN_PAUSED_UNKNOWN\" error messages in the libvirt log. This update\ncorrects the event sending order when resuming guests, which prevents the\nerrors being logged. (BZ#1588001)\n\n4. Once\nall virtual machines have shut down, start them again for this update to\ntake effect. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n====================================================================                   \nRed Hat Security Advisory\n\nSynopsis:          Important: kernel security and bug fix update\nAdvisory ID:       RHSA-2018:2161-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2018:2161\nIssue date:        2018-07-10\nCVE Names:         CVE-2018-3639\n====================================================================\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7.3\nExtended Update Support. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.3) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3) - x86_64\nRed Hat Enterprise Linux Server EUS (v. 7.3) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional EUS (v. 7.3) - ppc64, ppc64le, x86_64\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of Load & Store instructions\n(a commonly used performance optimization). It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well as\nthe fact that memory read from address to which a recent memory write has\noccurred may see an older value and subsequently cause an update into the\nmicroprocessor's data cache even for speculatively executed instructions\nthat never actually commit (retire). As a result, an unprivileged attacker\ncould use this flaw to read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2018-3639, x86 AMD)\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue. \n\nBug Fix(es):\n\n* When a Nonvolatile Memory Express (NVMe) namespace was created, changed,\nor deleted, an occasional deadlock occurred. With this update, namespace\nscanning and removal does not hold a mutual exclusion (mutex) program\nobject. As a result, a deadlock no longer occurs in the described scenario. \n(BZ#1566886)\n\n* Previously, a live migration of a virtual machine from one host with\nupdated firmware to another host without updated firmware resulted in\nincorrect kernel settings for Meltdown mitigations, which could leave the\nkernel vulnerable to Meltdown. With this fix, the firmware on the new\nphysical host is re-scanned for updates after a live migration. As a\nresult, the kernel uses the correct mitigation in the described scenario. \n(BZ#1570507)\n\n* Previously, microcode updates on 32 and 64-bit AMD and Intel\narchitectures were not synchronized. As a consequence, it was not possible\nto apply the microcode updates. This fix adds the synchronization to the\nmicrocode updates so that processors of the stated architectures receive\nupdates at the same time. As a result, microcode updates are now\nsynchronized. (BZ#1578044)\n\n* When switching from the indirect branch speculation (IBRS) feature to the\nretpolines feature, the IBRS state of some CPUs was sometimes not handled\ncorrectly. Consequently, some CPUs were left with the IBRS Model-Specific\nRegister (MSR) bit set to 1, which could lead to performance issues. With\nthis update, the underlying source code has been fixed to clear the IBRS\nMSR bits correctly, thus fixing the bug. (BZ#1586146)\n\nUsers of kernel are advised to upgrade to these updated packages, which fix\nthese bugs. \n\nThe system must be rebooted for this update to take effect. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1566890 - CVE-2018-3639 hw: cpu: speculative store bypass\n\n6. Package List:\n\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.3):\n\nSource:\nkernel-3.10.0-514.53.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-514.53.1.el7.noarch.rpm\nkernel-doc-3.10.0-514.53.1.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debug-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-devel-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-headers-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-514.53.1.el7.x86_64.rpm\nperf-3.10.0-514.53.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\npython-perf-3.10.0-514.53.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-514.53.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server EUS (v. 7.3):\n\nSource:\nkernel-3.10.0-514.53.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-514.53.1.el7.noarch.rpm\nkernel-doc-3.10.0-514.53.1.el7.noarch.rpm\n\nppc64:\nkernel-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-bootwrapper-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-debug-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-debug-devel-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-devel-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-headers-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-tools-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-tools-libs-3.10.0-514.53.1.el7.ppc64.rpm\nperf-3.10.0-514.53.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\npython-perf-3.10.0-514.53.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\n\nppc64le:\nkernel-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-debug-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-devel-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-headers-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-tools-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-514.53.1.el7.ppc64le.rpm\nperf-3.10.0-514.53.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\npython-perf-3.10.0-514.53.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\n\ns390x:\nkernel-3.10.0-514.53.1.el7.s390x.rpm\nkernel-debug-3.10.0-514.53.1.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-514.53.1.el7.s390x.rpm\nkernel-debug-devel-3.10.0-514.53.1.el7.s390x.rpm\nkernel-debuginfo-3.10.0-514.53.1.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-514.53.1.el7.s390x.rpm\nkernel-devel-3.10.0-514.53.1.el7.s390x.rpm\nkernel-headers-3.10.0-514.53.1.el7.s390x.rpm\nkernel-kdump-3.10.0-514.53.1.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-514.53.1.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-514.53.1.el7.s390x.rpm\nperf-3.10.0-514.53.1.el7.s390x.rpm\nperf-debuginfo-3.10.0-514.53.1.el7.s390x.rpm\npython-perf-3.10.0-514.53.1.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-514.53.1.el7.s390x.rpm\n\nx86_64:\nkernel-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debug-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-devel-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-headers-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-514.53.1.el7.x86_64.rpm\nperf-3.10.0-514.53.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\npython-perf-3.10.0-514.53.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional EUS (v. 7.3):\n\nppc64:\nkernel-debug-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-tools-libs-devel-3.10.0-514.53.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\n\nppc64le:\nkernel-debug-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-514.53.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-514.53.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2018-3639\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nYF80GD/Rvjo=ltf/\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. Relevant releases/architectures:\n\nRHV-M 4.3 - noarch\n\n3. \nIt includes the configuration of the Red Hat Support plugin, copying\ndownstream-only artifacts to the ISO domain, and links to the knowledgebase\nand other support material. There are three primary variants of the\nissue which differ in the way the speculative execution can be exploited. \nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors,\nduring speculative execution of instruction permission faults, exception\ngeneration triggered by a faulting access is suppressed until the\nretirement of the whole instruction block. Note: CVE-2017-5754 affects Intel\nx86-64 microprocessors. AMD x86-64 microprocessors are not affected by this\nissue. (CVE-2017-5754)\n\nBug Fix(es):\n\n* [CVE-2017-5754] Variant3: POWER {qemu-kvm-rhev} Add machine type variants\n(BZ#1559948)\n\n* add POWER 9 to the 4.2 cluster level (BZ#1574494)\n\n4. 6.6) - x86_64\n\n3. Description:\n\nThe libvirt library contains a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems. In\naddition, libvirt provides tools for remote management of virtualized\nsystems",
      sources: [
         {
            db: "NVD",
            id: "CVE-2018-3639",
         },
         {
            db: "CERT/CC",
            id: "VU#180049",
         },
         {
            db: "CNVD",
            id: "CNVD-2018-13391",
         },
         {
            db: "VULHUB",
            id: "VHN-133670",
         },
         {
            db: "VULHUB",
            id: "VHN-133671",
         },
         {
            db: "PACKETSTORM",
            id: "147778",
         },
         {
            db: "PACKETSTORM",
            id: "150070",
         },
         {
            db: "PACKETSTORM",
            id: "148244",
         },
         {
            db: "PACKETSTORM",
            id: "151288",
         },
         {
            db: "PACKETSTORM",
            id: "147738",
         },
         {
            db: "PACKETSTORM",
            id: "147758",
         },
         {
            db: "PACKETSTORM",
            id: "148330",
         },
         {
            db: "PACKETSTORM",
            id: "148484",
         },
         {
            db: "PACKETSTORM",
            id: "152767",
         },
         {
            db: "PACKETSTORM",
            id: "150077",
         },
         {
            db: "PACKETSTORM",
            id: "147748",
         },
         {
            db: "PACKETSTORM",
            id: "150075",
         },
      ],
      trust: 3.42,
   },
   exploit_availability: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            reference: "https://www.scap.org.cn/vuln/vhn-133670",
            trust: 0.1,
            type: "unknown",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133670",
         },
      ],
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2018-3639",
            trust: 3.6,
         },
         {
            db: "USCERT",
            id: "TA18-141A",
            trust: 2.6,
         },
         {
            db: "CERT/CC",
            id: "VU#180049",
            trust: 2.6,
         },
         {
            db: "SECTRACK",
            id: "1040949",
            trust: 2.4,
         },
         {
            db: "BID",
            id: "104232",
            trust: 2.3,
         },
         {
            db: "LENOVO",
            id: "LEN-22133",
            trust: 1.8,
         },
         {
            db: "SIEMENS",
            id: "SSA-268644",
            trust: 1.8,
         },
         {
            db: "SIEMENS",
            id: "SSA-608355",
            trust: 1.8,
         },
         {
            db: "SECTRACK",
            id: "1042004",
            trust: 1.8,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2020/06/10/5",
            trust: 1.7,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2020/06/10/1",
            trust: 1.7,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2020/06/10/2",
            trust: 1.7,
         },
         {
            db: "EXPLOIT-DB",
            id: "44695",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-505225",
            trust: 1.7,
         },
         {
            db: "CERT/CC",
            id: "VU#584653",
            trust: 0.8,
         },
         {
            db: "PACKETSTORM",
            id: "152767",
            trust: 0.8,
         },
         {
            db: "CNVD",
            id: "CNVD-2018-13391",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.2340",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.3058",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.2798",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.3052",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.0077.2",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.1025.2",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.4343",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.0854",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.4156",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.0726",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-30550",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201805-749",
            trust: 0.6,
         },
         {
            db: "PACKETSTORM",
            id: "148484",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "147748",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "148330",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "150077",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "147738",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "147778",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "147758",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "150075",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "151288",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "148581",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148151",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147743",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148318",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148731",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148817",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "150097",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147932",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "150076",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147839",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147749",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148324",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147769",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147746",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147765",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147762",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147770",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147754",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147756",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147931",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148323",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147751",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147747",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147764",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147755",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147873",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "150073",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148699",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147763",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148656",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147744",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147779",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147734",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147750",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148370",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147767",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147719",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "150090",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147737",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147742",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147796",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147720",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "149127",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "149390",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148614",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148818",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147752",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "150096",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147745",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147753",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148751",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147780",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148842",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147733",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147866",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147740",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147757",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147741",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "150079",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "150078",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148853",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147735",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147766",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148695",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147938",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147933",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147721",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147760",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148975",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "150095",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "150074",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147736",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147761",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148317",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147904",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147759",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147930",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148507",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147739",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147851",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "147934",
            trust: 0.1,
         },
         {
            db: "VULHUB",
            id: "VHN-133670",
            trust: 0.1,
         },
         {
            db: "BID",
            id: "104228",
            trust: 0.1,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201805-748",
            trust: 0.1,
         },
         {
            db: "VULHUB",
            id: "VHN-133671",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "150070",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "148244",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#180049",
         },
         {
            db: "CNVD",
            id: "CNVD-2018-13391",
         },
         {
            db: "VULHUB",
            id: "VHN-133670",
         },
         {
            db: "VULHUB",
            id: "VHN-133671",
         },
         {
            db: "PACKETSTORM",
            id: "147778",
         },
         {
            db: "PACKETSTORM",
            id: "150070",
         },
         {
            db: "PACKETSTORM",
            id: "148244",
         },
         {
            db: "PACKETSTORM",
            id: "151288",
         },
         {
            db: "PACKETSTORM",
            id: "150075",
         },
         {
            db: "PACKETSTORM",
            id: "147738",
         },
         {
            db: "PACKETSTORM",
            id: "147758",
         },
         {
            db: "PACKETSTORM",
            id: "148330",
         },
         {
            db: "PACKETSTORM",
            id: "148484",
         },
         {
            db: "PACKETSTORM",
            id: "152767",
         },
         {
            db: "PACKETSTORM",
            id: "150077",
         },
         {
            db: "PACKETSTORM",
            id: "147748",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201805-749",
         },
         {
            db: "NVD",
            id: "CVE-2018-3639",
         },
      ],
   },
   id: "VAR-201805-0963",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-13391",
         },
         {
            db: "VULHUB",
            id: "VHN-133670",
         },
         {
            db: "VULHUB",
            id: "VHN-133671",
         },
      ],
      trust: 1.4987851138095238,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "Network device",
            ],
            sub_category: null,
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-13391",
         },
      ],
   },
   last_update_date: "2024-11-29T22:19:19.544000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Patches for multiple CPUHardware information disclosure vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchInfo/show/134555",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2018-13391",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-203",
            trust: 1.2,
         },
         {
            problemtype: "CWE-200",
            trust: 0.2,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133670",
         },
         {
            db: "VULHUB",
            id: "VHN-133671",
         },
         {
            db: "NVD",
            id: "CVE-2018-3639",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.4,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html",
         },
         {
            trust: 2.6,
            url: "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
         },
         {
            trust: 2.6,
            url: "https://www.us-cert.gov/ncas/alerts/ta18-141a",
         },
         {
            trust: 2.6,
            url: "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180521-cpusidechannel",
         },
         {
            trust: 2.5,
            url: "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528",
         },
         {
            trust: 2.3,
            url: "http://www.securityfocus.com/bid/104232",
         },
         {
            trust: 2.3,
            url: "https://www.oracle.com/security-alerts/cpujul2020.html",
         },
         {
            trust: 2.3,
            url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html",
         },
         {
            trust: 2.3,
            url: "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html",
         },
         {
            trust: 1.8,
            url: "https://www.kb.cert.org/vuls/id/180049",
         },
         {
            trust: 1.8,
            url: "http://support.lenovo.com/us/en/solutions/len-22133",
         },
         {
            trust: 1.8,
            url: "http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html",
         },
         {
            trust: 1.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf",
         },
         {
            trust: 1.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf",
         },
         {
            trust: 1.8,
            url: "https://security.netapp.com/advisory/ntap-20180521-0001/",
         },
         {
            trust: 1.8,
            url: "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006",
         },
         {
            trust: 1.8,
            url: "https://www.synology.com/support/security/synology_sa_18_23",
         },
         {
            trust: 1.8,
            url: "https://www.debian.org/security/2018/dsa-4273",
         },
         {
            trust: 1.8,
            url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html",
         },
         {
            trust: 1.8,
            url: "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html",
         },
         {
            trust: 1.8,
            url: "https://access.redhat.com/errata/rhsa-2018:1649",
         },
         {
            trust: 1.8,
            url: "https://access.redhat.com/errata/rhsa-2018:1653",
         },
         {
            trust: 1.8,
            url: "https://access.redhat.com/errata/rhsa-2018:1655",
         },
         {
            trust: 1.8,
            url: "https://access.redhat.com/errata/rhsa-2018:1689",
         },
         {
            trust: 1.8,
            url: "https://access.redhat.com/errata/rhsa-2018:1854",
         },
         {
            trust: 1.8,
            url: "https://access.redhat.com/errata/rhsa-2018:2060",
         },
         {
            trust: 1.8,
            url: "https://access.redhat.com/errata/rhsa-2018:2161",
         },
         {
            trust: 1.8,
            url: "https://access.redhat.com/errata/rhsa-2018:2948",
         },
         {
            trust: 1.8,
            url: "https://access.redhat.com/errata/rhsa-2018:3398",
         },
         {
            trust: 1.8,
            url: "https://access.redhat.com/errata/rhsa-2018:3400",
         },
         {
            trust: 1.8,
            url: "https://access.redhat.com/errata/rhsa-2019:0148",
         },
         {
            trust: 1.8,
            url: "https://access.redhat.com/errata/rhsa-2019:1046",
         },
         {
            trust: 1.8,
            url: "http://www.securitytracker.com/id/1040949",
         },
         {
            trust: 1.8,
            url: "http://www.securitytracker.com/id/1042004",
         },
         {
            trust: 1.8,
            url: "https://usn.ubuntu.com/3756-1/",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/security/vulnerabilities/ssbd",
         },
         {
            trust: 1.7,
            url: "https://seclists.org/bugtraq/2019/jun/36",
         },
         {
            trust: 1.7,
            url: "http://xenbits.xen.org/xsa/advisory-263.html",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf",
         },
         {
            trust: 1.7,
            url: "https://help.ecostruxureit.com/display/public/uadce725/security+fixes+in+struxureware+data+center+expert+v7.6.0",
         },
         {
            trust: 1.7,
            url: "https://nvidia.custhelp.com/app/answers/detail/a_id/4787",
         },
         {
            trust: 1.7,
            url: "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180012",
         },
         {
            trust: 1.7,
            url: "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2018-0004",
         },
         {
            trust: 1.7,
            url: "https://support.citrix.com/article/ctx235225",
         },
         {
            trust: 1.7,
            url: "https://support.oracle.com/knowledge/sun%20microsystems/2481872_1.html",
         },
         {
            trust: 1.7,
            url: "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html",
         },
         {
            trust: 1.7,
            url: "https://www.debian.org/security/2018/dsa-4210",
         },
         {
            trust: 1.7,
            url: "https://www.exploit-db.com/exploits/44695/",
         },
         {
            trust: 1.7,
            url: "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html",
         },
         {
            trust: 1.7,
            url: "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html",
         },
         {
            trust: 1.7,
            url: "http://www.openwall.com/lists/oss-security/2020/06/10/2",
         },
         {
            trust: 1.7,
            url: "http://www.openwall.com/lists/oss-security/2020/06/10/5",
         },
         {
            trust: 1.7,
            url: "http://www.openwall.com/lists/oss-security/2020/06/10/1",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1629",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1630",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1632",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1633",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1635",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1636",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1637",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1638",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1639",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1640",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1641",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1642",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1643",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1644",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1645",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1646",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1647",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1648",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1650",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1651",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1652",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1654",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1656",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1657",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1658",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1659",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1660",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1661",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1662",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1663",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1664",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1665",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1666",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1667",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1668",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1669",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1674",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1675",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1676",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1686",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1688",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1690",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1696",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1710",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1711",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1737",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1738",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1826",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1965",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1967",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:1997",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2001",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2003",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2006",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2162",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2164",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2171",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2172",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2216",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2228",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2246",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2250",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2258",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2289",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2309",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2328",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2363",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2364",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2387",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2394",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:2396",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:3396",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:3397",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:3399",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:3401",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:3402",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:3407",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:3423",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:3424",
         },
         {
            trust: 1.7,
            url: "https://access.redhat.com/errata/rhsa-2018:3425",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html",
         },
         {
            trust: 1.7,
            url: "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html",
         },
         {
            trust: 1.7,
            url: "https://usn.ubuntu.com/3651-1/",
         },
         {
            trust: 1.7,
            url: "https://usn.ubuntu.com/3652-1/",
         },
         {
            trust: 1.7,
            url: "https://usn.ubuntu.com/3653-1/",
         },
         {
            trust: 1.7,
            url: "https://usn.ubuntu.com/3653-2/",
         },
         {
            trust: 1.7,
            url: "https://usn.ubuntu.com/3654-1/",
         },
         {
            trust: 1.7,
            url: "https://usn.ubuntu.com/3654-2/",
         },
         {
            trust: 1.7,
            url: "https://usn.ubuntu.com/3655-1/",
         },
         {
            trust: 1.7,
            url: "https://usn.ubuntu.com/3655-2/",
         },
         {
            trust: 1.7,
            url: "https://usn.ubuntu.com/3679-1/",
         },
         {
            trust: 1.7,
            url: "https://usn.ubuntu.com/3680-1/",
         },
         {
            trust: 1.7,
            url: "https://usn.ubuntu.com/3777-3/",
         },
         {
            trust: 1.6,
            url: "https://support.apple.com//ht208394",
         },
         {
            trust: 1.6,
            url: "http://www.dell.com/support/speculative-store-bypass",
         },
         {
            trust: 1.6,
            url: "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03850en_us",
         },
         {
            trust: 1.2,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 1.2,
            url: "https://access.redhat.com/security/cve/cve-2018-3639",
         },
         {
            trust: 1.2,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 1.2,
            url: "https://access.redhat.com/security/team/key/",
         },
         {
            trust: 1.2,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 1.2,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 1.1,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 1.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-3639",
         },
         {
            trust: 0.8,
            url: "https://vuls.cert.org/confluence/display/wiki/vulnerabilities+associated+with+cpu+speculative+execution",
         },
         {
            trust: 0.8,
            url: "https://developer.amd.com/wp-content/resources/124441_amd64_speculativestorebypassdisable_whitepaper_final.pdf",
         },
         {
            trust: 0.8,
            url: "https://www.kb.cert.org/vuls/id/584653",
         },
         {
            trust: 0.8,
            url: "http://cwe.mitre.org/data/definitions/208.html",
         },
         {
            trust: 0.8,
            url: "https://software.intel.com/sites/default/files/managed/c5/63/336996-speculative-execution-side-channel-mitigations.pdf",
         },
         {
            trust: 0.8,
            url: "https://software.intel.com/sites/default/files/managed/b9/f9/336983-intel-analysis-of-speculative-execution-side-channels-white-paper.pdf",
         },
         {
            trust: 0.8,
            url: "https://fortiguard.com/psirt/fg-ir-18-002",
         },
         {
            trust: 0.8,
            url: "https://support.hp.com/us-en/document/c06001626",
         },
         {
            trust: 0.8,
            url: "http://www.hitachi.com/hirt/publications/hirt-pub18001/",
         },
         {
            trust: 0.8,
            url: "https://www.ibm.com/blogs/psirt/potential-impact-processors-power-family/",
         },
         {
            trust: 0.8,
            url: "https://docs.microsoft.com/en-us/cpp/security/developer-guidance-speculative-execution",
         },
         {
            trust: 0.8,
            url: "https://www.suse.com/support/kb/doc/?id=7022937",
         },
         {
            trust: 0.8,
            url: "https://www.synology.com/en-global/support/security/synology_sa_18_23",
         },
         {
            trust: 0.8,
            url: "https://wiki.ubuntu.com/securityteam/knowledgebase/variant4",
         },
         {
            trust: 0.8,
            url: "https://kb.vmware.com/s/article/54951",
         },
         {
            trust: 0.8,
            url: "https://aws.amazon.com/security/security-bulletins/aws-2018-015/",
         },
         {
            trust: 0.6,
            url: "https://securitytracker.com/id/1040949",
         },
         {
            trust: 0.6,
            url: "https://www.suse.com/support/update/announcement/2019/suse-su-20190049-1/",
         },
         {
            trust: 0.6,
            url: "http://www.ibm.com/support/docview.wss",
         },
         {
            trust: 0.6,
            url: "https://security.business.xerox.com/wp-content/uploads/2019/11/cert_xrx19-029_ffpsv2_win10_securitybulletin_nov2019.pdf",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/77958",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/73854",
         },
         {
            trust: 0.6,
            url: "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20180615-01-cpu-cn",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.2340/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/76682",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/152767/red-hat-security-advisory-2019-1046-01.html",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2019.4343/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.2798/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.3052/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.4156",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.3058",
         },
         {
            trust: 0.6,
            url: "http://www.ibm.com/support/docview.wss?uid=ibm10872470",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/77246",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-30550",
         },
         {
            trust: 0.6,
            url: "http://www.ibm.com/support/docview.wss?uid=ibm10879093",
         },
         {
            trust: 0.2,
            url: "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-hpesbhf03850en_us",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/cve/cve-2018-5803",
         },
         {
            trust: 0.1,
            url: "http://www.securityfocus.com/bid/104228",
         },
         {
            trust: 0.1,
            url: "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180013",
         },
         {
            trust: 0.1,
            url: "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2018-0005",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-7566",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-1120",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-1000200",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-16648",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-10880",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-10882",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-10883",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-1065",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-10881",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-10322",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-14619",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-10877",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-10878",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-13405",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-10880",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-10882",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-18208",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-12232",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-17805",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-1000026",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-1000200",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-17805",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-10877",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-10879",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-10883",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-1000204",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-10322",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-16648",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-10879",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-1092",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-11506",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-5750",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/articles/3658021",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-18075",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-10881",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-1095",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-13166",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-1118",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-17806",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-5390",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-13166",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-1000026",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-8781",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-18208",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-9363",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-14641",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-1065",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-1068",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-5344",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-1094",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-18344",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-10940",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-1068",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-1092",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/articles/3553061",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-18344",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-1094",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-7757",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-10940",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-5848",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-1118",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-5391",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-10878",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-1095",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-1000204",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-18075",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-17806",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-1120",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/6.10_technical_notes/index.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-5803",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-2671",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2012-6701",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-7308",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-7889",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-2671",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-8890",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-7889",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-1130",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-15121",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2015-8830",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/6.10_release_notes/index.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-12190",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-9077",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-18203",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-6001",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2012-6701",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-9076",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-9076",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2015-8830",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-9075",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-7616",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-9075",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-6001",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-9077",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-15121",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2018-1130",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2017-8890",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2016-8650",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-7616",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-18203",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/security/cve/cve-2016-8650",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-12190",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-7308",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/articles/2974891",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#180049",
         },
         {
            db: "CNVD",
            id: "CNVD-2018-13391",
         },
         {
            db: "VULHUB",
            id: "VHN-133670",
         },
         {
            db: "VULHUB",
            id: "VHN-133671",
         },
         {
            db: "PACKETSTORM",
            id: "147778",
         },
         {
            db: "PACKETSTORM",
            id: "150070",
         },
         {
            db: "PACKETSTORM",
            id: "148244",
         },
         {
            db: "PACKETSTORM",
            id: "151288",
         },
         {
            db: "PACKETSTORM",
            id: "150075",
         },
         {
            db: "PACKETSTORM",
            id: "147738",
         },
         {
            db: "PACKETSTORM",
            id: "147758",
         },
         {
            db: "PACKETSTORM",
            id: "148330",
         },
         {
            db: "PACKETSTORM",
            id: "148484",
         },
         {
            db: "PACKETSTORM",
            id: "152767",
         },
         {
            db: "PACKETSTORM",
            id: "150077",
         },
         {
            db: "PACKETSTORM",
            id: "147748",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201805-749",
         },
         {
            db: "NVD",
            id: "CVE-2018-3639",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#180049",
         },
         {
            db: "CNVD",
            id: "CNVD-2018-13391",
         },
         {
            db: "VULHUB",
            id: "VHN-133670",
         },
         {
            db: "VULHUB",
            id: "VHN-133671",
         },
         {
            db: "PACKETSTORM",
            id: "147778",
         },
         {
            db: "PACKETSTORM",
            id: "150070",
         },
         {
            db: "PACKETSTORM",
            id: "148244",
         },
         {
            db: "PACKETSTORM",
            id: "151288",
         },
         {
            db: "PACKETSTORM",
            id: "150075",
         },
         {
            db: "PACKETSTORM",
            id: "147738",
         },
         {
            db: "PACKETSTORM",
            id: "147758",
         },
         {
            db: "PACKETSTORM",
            id: "148330",
         },
         {
            db: "PACKETSTORM",
            id: "148484",
         },
         {
            db: "PACKETSTORM",
            id: "152767",
         },
         {
            db: "PACKETSTORM",
            id: "150077",
         },
         {
            db: "PACKETSTORM",
            id: "147748",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201805-749",
         },
         {
            db: "NVD",
            id: "CVE-2018-3639",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-05-21T00:00:00",
            db: "CERT/CC",
            id: "VU#180049",
         },
         {
            date: "2018-07-18T00:00:00",
            db: "CNVD",
            id: "CNVD-2018-13391",
         },
         {
            date: "2018-05-22T00:00:00",
            db: "VULHUB",
            id: "VHN-133670",
         },
         {
            date: "2018-05-22T00:00:00",
            db: "VULHUB",
            id: "VHN-133671",
         },
         {
            date: "2018-05-23T07:09:25",
            db: "PACKETSTORM",
            id: "147778",
         },
         {
            date: "2018-10-31T01:11:59",
            db: "PACKETSTORM",
            id: "150070",
         },
         {
            date: "2018-06-19T22:22:22",
            db: "PACKETSTORM",
            id: "148244",
         },
         {
            date: "2019-01-23T21:29:07",
            db: "PACKETSTORM",
            id: "151288",
         },
         {
            date: "2018-10-31T01:13:27",
            db: "PACKETSTORM",
            id: "150075",
         },
         {
            date: "2018-05-23T06:55:26",
            db: "PACKETSTORM",
            id: "147738",
         },
         {
            date: "2018-05-23T07:01:56",
            db: "PACKETSTORM",
            id: "147758",
         },
         {
            date: "2018-06-27T13:56:46",
            db: "PACKETSTORM",
            id: "148330",
         },
         {
            date: "2018-07-11T02:45:29",
            db: "PACKETSTORM",
            id: "148484",
         },
         {
            date: "2019-05-08T17:46:11",
            db: "PACKETSTORM",
            id: "152767",
         },
         {
            date: "2018-10-31T01:13:43",
            db: "PACKETSTORM",
            id: "150077",
         },
         {
            date: "2018-05-23T06:59:09",
            db: "PACKETSTORM",
            id: "147748",
         },
         {
            date: "2018-05-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201805-749",
         },
         {
            date: "2018-05-22T12:29:00.250000",
            db: "NVD",
            id: "CVE-2018-3639",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-06-19T00:00:00",
            db: "CERT/CC",
            id: "VU#180049",
         },
         {
            date: "2018-07-18T00:00:00",
            db: "CNVD",
            id: "CNVD-2018-13391",
         },
         {
            date: "2020-09-02T00:00:00",
            db: "VULHUB",
            id: "VHN-133670",
         },
         {
            date: "2020-08-24T00:00:00",
            db: "VULHUB",
            id: "VHN-133671",
         },
         {
            date: "2021-12-08T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201805-749",
         },
         {
            date: "2024-11-21T04:05:48.867000",
            db: "NVD",
            id: "CVE-2018-3639",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201805-749",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "CPU hardware utilizing speculative execution may be vulnerable to cache side-channel attacks",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#180049",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "bypass",
      sources: [
         {
            db: "PACKETSTORM",
            id: "147778",
         },
         {
            db: "PACKETSTORM",
            id: "151288",
         },
         {
            db: "PACKETSTORM",
            id: "150075",
         },
         {
            db: "PACKETSTORM",
            id: "147738",
         },
         {
            db: "PACKETSTORM",
            id: "147758",
         },
         {
            db: "PACKETSTORM",
            id: "148330",
         },
         {
            db: "PACKETSTORM",
            id: "148484",
         },
         {
            db: "PACKETSTORM",
            id: "150077",
         },
         {
            db: "PACKETSTORM",
            id: "147748",
         },
      ],
      trust: 0.9,
   },
}

var-202106-0697
Vulnerability from variot

Race condition in a subsystem in the Intel(R) LMS versions before 2039.1.0.0 may allow a privileged user to potentially enable escalation of privilege via local access. Intel(R) LMS Is vulnerable to a race condition.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0697",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic ipc477e pro",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc647e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic ipc547g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc677e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc527g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc627e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "local manageability service",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "2039.1.0.0",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc847e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "intel local manageability service",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: null,
         },
         {
            model: "intel local manageability service",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "2039.1.0.0",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            db: "NVD",
            id: "CVE-2020-8704",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens reported these vulnerabilities to CISA.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-562",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2020-8704",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.4,
                  id: "CVE-2020-8704",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.9,
                  vectorString: "AV:L/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.4,
                  id: "VHN-186829",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:L/AC:M/AU:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  author: "nvd@nist.gov",
                  availabilityImpact: "HIGH",
                  baseScore: 6.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.5,
                  id: "CVE-2020-8704",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "High",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 6.4,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-8704",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2020-8704",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2020-8704",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202106-562",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-186829",
                  trust: 0.1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-8704",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186829",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8704",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-562",
         },
         {
            db: "NVD",
            id: "CVE-2020-8704",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Race condition in a subsystem in the Intel(R) LMS versions before 2039.1.0.0 may allow a privileged user to potentially enable escalation of privilege via local access. Intel(R) LMS Is vulnerable to a race condition.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-8704",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULHUB",
            id: "VHN-186829",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8704",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-8704",
            trust: 3.4,
         },
         {
            db: "SIEMENS",
            id: "SSA-309571",
            trust: 1.8,
         },
         {
            db: "JVN",
            id: "JVNVU99965981",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.1997",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021081109",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021061712",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-222-05",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-51731",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-562",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-186829",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2020-8704",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186829",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8704",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-562",
         },
         {
            db: "NVD",
            id: "CVE-2020-8704",
         },
      ],
   },
   id: "VAR-202106-0697",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186829",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T12:15:31.214000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INTEL-SA-00459",
            trust: 0.8,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html",
         },
         {
            title: "Intel(R) LMS Repair measures for the competition condition problem loophole",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=155256",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=240e27e5c8fba28153598a375a2a4130",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8704",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-562",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-362",
            trust: 1.1,
         },
         {
            problemtype: "Race condition (CWE-362) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186829",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            db: "NVD",
            id: "CVE-2020-8704",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.8,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu99965981/",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-8704",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021081109",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-51731",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/intel-processor-multiple-vulnerabilities-via-csme-sps-lms-35670",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021061712",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.1997",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-222-05",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/362.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://cert-portal.siemens.com/productcert/txt/ssa-309571.txt",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186829",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8704",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-562",
         },
         {
            db: "NVD",
            id: "CVE-2020-8704",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-186829",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8704",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-562",
         },
         {
            db: "NVD",
            id: "CVE-2020-8704",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-06-09T00:00:00",
            db: "VULHUB",
            id: "VHN-186829",
         },
         {
            date: "2021-06-09T00:00:00",
            db: "VULMON",
            id: "CVE-2020-8704",
         },
         {
            date: "2022-03-18T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-06-08T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-562",
         },
         {
            date: "2021-06-09T19:15:09.263000",
            db: "NVD",
            id: "CVE-2020-8704",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-22T00:00:00",
            db: "VULHUB",
            id: "VHN-186829",
         },
         {
            date: "2021-08-10T00:00:00",
            db: "VULMON",
            id: "CVE-2020-8704",
         },
         {
            date: "2022-03-18T07:14:00",
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2022-04-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-562",
         },
         {
            date: "2022-04-22T16:20:40.843000",
            db: "NVD",
            id: "CVE-2020-8704",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-562",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Intel(R) LMS  Race Vulnerability in",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
}

var-202202-0108
Vulnerability from variot

An issue was discovered in AhciBusDxe in the kernel 5.0 through 5.5 in Insyde InsydeH2O. Because of an Untrusted Pointer Dereference that causes SMM memory corruption, an attacker may be able to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count

SMM Privilege Escalation 10

SMM Memory Corruption 12

DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. Insyde InsydeH2O Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0108",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.2",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.08.41",
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc627e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.0",
         },
         {
            model: "simatic ipc677e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc847e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.35.41",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.4",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc227g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.16.41",
         },
         {
            model: "simatic ipc327g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc127e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.1",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.43.41",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.3",
         },
         {
            model: "simatic ipc277g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.26.41",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc377g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc647e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.5",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.51.41",
         },
         {
            model: "insydeh2o",
            scope: null,
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
         {
            db: "NVD",
            id: "CVE-2021-41837",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.08.41",
                        versionStartIncluding: "5.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.16.41",
                        versionStartIncluding: "5.1",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.26.41",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.35.41",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.43.41",
                        versionStartIncluding: "5.4",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.51.41",
                        versionStartIncluding: "5.5",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc227g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc277g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc327g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc377g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41837",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This document was written by Vijay Sarvepalli.Statement Date:   March 01, 2022",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2021-41837",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.2,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2021-41837",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 8.2,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.5,
                  impactScore: 6,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 8.2,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-41837",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Changed",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-41837",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202202-113",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
         {
            db: "NVD",
            id: "CVE-2021-41837",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-113",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "An issue was discovered in AhciBusDxe in the kernel 5.0 through 5.5 in Insyde InsydeH2O. Because of an Untrusted Pointer Dereference that causes SMM memory corruption, an attacker may be able to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count \n\n\n\n\nSMM Privilege Escalation 10 \n\n\n SMM Memory Corruption  12 \n\n\n DXE Memory Corruption 1CVE-2020-27339 Affected\nCVE-2020-5953 Affected\nCVE-2021-33625 Affected\nCVE-2021-33626 Affected\nCVE-2021-33627 Affected\nCVE-2021-41837 Affected\nCVE-2021-41838 Affected\nCVE-2021-41839 Affected\nCVE-2021-41840 Affected\nCVE-2021-41841 Affected\nCVE-2021-42059 Affected\nCVE-2021-42060 Not Affected\nCVE-2021-42113 Affected\nCVE-2021-42554 Affected\nCVE-2021-43323 Affected\nCVE-2021-43522 Affected\nCVE-2021-43615 Not Affected\nCVE-2021-45969 Not Affected\nCVE-2021-45970 Not Affected\nCVE-2021-45971 Not Affected\nCVE-2022-24030 Not Affected\nCVE-2022-24031 Not Affected\nCVE-2022-24069 Not Affected\nCVE-2022-28806 Unknown. Insyde InsydeH2O Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41837",
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-41837",
            trust: 4,
         },
         {
            db: "SIEMENS",
            id: "SSA-306654",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97136454",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001345",
            trust: 0.8,
         },
         {
            db: "LENOVO",
            id: "LEN-73436",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2022020314",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-113",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
         {
            db: "NVD",
            id: "CVE-2021-41837",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-113",
         },
      ],
   },
   id: "VAR-202202-0108",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2023-12-18T11:25:14.275000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Insyde's Security Pledge Security Advisory",
            trust: 0.8,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            title: "Insyde InsydeH2O Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=181526",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-113",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1,
         },
         {
            problemtype: "Buffer error (CWE-119) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
         {
            db: "NVD",
            id: "CVE-2021-41837",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
         },
         {
            trust: 1.6,
            url: "https://security.netapp.com/advisory/ntap-20220222-0003/",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge/sa-2022024",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-41837",
         },
         {
            trust: 0.8,
            url: "cve-2020-27339  ",
         },
         {
            trust: 0.8,
            url: "cve-2020-5953  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33625  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33626  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33627  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41837  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41838  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41839  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41840  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41841  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42059  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42060  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42113  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42554  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43323  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43522  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43615  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45969  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45970  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45971  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24030  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24031  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24069  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-28806  ",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu97136454/index.html",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/independent-bios-developers-multiple-vulnerabilities-via-uefi-37438",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022020314",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-73436",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
         {
            db: "NVD",
            id: "CVE-2021-41837",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-113",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
         {
            db: "NVD",
            id: "CVE-2021-41837",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-113",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-01T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
         {
            date: "2022-02-03T02:15:07.033000",
            db: "NVD",
            id: "CVE-2021-41837",
         },
         {
            date: "2022-02-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-113",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-28T07:09:00",
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
         {
            date: "2022-03-01T19:43:28.793000",
            db: "NVD",
            id: "CVE-2021-41837",
         },
         {
            date: "2022-03-10T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-113",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-113",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-113",
         },
      ],
      trust: 0.6,
   },
}

var-202202-0147
Vulnerability from variot

An issue was discovered in Insyde InsydeH2O with Kernel 5.0 before 05.08.42, Kernel 5.1 before 05.16.42, Kernel 5.2 before 05.26.42, Kernel 5.3 before 05.35.42, Kernel 5.4 before 05.42.51, and Kernel 5.5 before 05.50.51. An SMM memory corruption vulnerability in FvbServicesRuntimeDxe allows a possible attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count

SMM Privilege Escalation 10

SMM Memory Corruption 12

DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. Insyde InsydeH2O Kernel Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0147",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.2",
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc627e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.0",
         },
         {
            model: "simatic ipc677e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc847e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.4",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc227g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc327g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "ruggedcom ape1808",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc127e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.1",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.3",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.08.42",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.35.42",
         },
         {
            model: "simatic ipc277g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc377g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.26.42",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.16.42",
         },
         {
            model: "simatic ipc647e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.50.51",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.42.51",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.5",
         },
         {
            model: "insydeh2o",
            scope: null,
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
         {
            db: "NVD",
            id: "CVE-2021-42554",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.08.42",
                        versionStartIncluding: "5.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.16.42",
                        versionStartIncluding: "5.1",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.26.42",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.35.42",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.42.51",
                        versionStartIncluding: "5.4",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.50.51",
                        versionStartIncluding: "5.5",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc227g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc277g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc327g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc377g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:ruggedcom_ape1808_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:ruggedcom_ape1808:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-42554",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This document was written by Vijay Sarvepalli.Statement Date:   March 01, 2022",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2021-42554",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 10,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2021-42554",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 8.2,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.5,
                  impactScore: 6,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 9.8,
                  baseSeverity: "Critical",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-42554",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-42554",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "CVE-2021-42554",
                  trust: 0.8,
                  value: "Critical",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202202-107",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
         {
            db: "NVD",
            id: "CVE-2021-42554",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-107",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "An issue was discovered in Insyde InsydeH2O with Kernel 5.0 before 05.08.42, Kernel 5.1 before 05.16.42, Kernel 5.2 before 05.26.42, Kernel 5.3 before 05.35.42, Kernel 5.4 before 05.42.51, and Kernel 5.5 before 05.50.51. An SMM memory corruption vulnerability in FvbServicesRuntimeDxe allows a possible attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count \n\n\n\n\nSMM Privilege Escalation 10 \n\n\n SMM Memory Corruption  12 \n\n\n DXE Memory Corruption 1CVE-2020-27339 Affected\nCVE-2020-5953 Affected\nCVE-2021-33625 Affected\nCVE-2021-33626 Affected\nCVE-2021-33627 Affected\nCVE-2021-41837 Affected\nCVE-2021-41838 Affected\nCVE-2021-41839 Affected\nCVE-2021-41840 Affected\nCVE-2021-41841 Affected\nCVE-2021-42059 Affected\nCVE-2021-42060 Not Affected\nCVE-2021-42113 Affected\nCVE-2021-42554 Affected\nCVE-2021-43323 Affected\nCVE-2021-43522 Affected\nCVE-2021-43615 Not Affected\nCVE-2021-45969 Not Affected\nCVE-2021-45970 Not Affected\nCVE-2021-45971 Not Affected\nCVE-2022-24030 Not Affected\nCVE-2022-24031 Not Affected\nCVE-2022-24069 Not Affected\nCVE-2022-28806 Unknown. Insyde InsydeH2O Kernel Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-42554",
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-42554",
            trust: 4,
         },
         {
            db: "SIEMENS",
            id: "SSA-306654",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97136454",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001353",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2022020318",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-73436",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-107",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
         {
            db: "NVD",
            id: "CVE-2021-42554",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-107",
         },
      ],
   },
   id: "VAR-202202-0147",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2023-12-18T11:07:31.315000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Insyde's Security Pledge Security Advisory",
            trust: 0.8,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            title: "Insyde InsydeH2O Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185270",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-107",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
         {
            db: "NVD",
            id: "CVE-2021-42554",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
         },
         {
            trust: 1.6,
            url: "https://security.netapp.com/advisory/ntap-20220216-0007/",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge/sa-2022012",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-42554",
         },
         {
            trust: 0.8,
            url: "cve-2020-27339  ",
         },
         {
            trust: 0.8,
            url: "cve-2020-5953  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33625  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33626  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33627  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41837  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41838  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41839  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41840  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41841  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42059  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42060  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42113  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42554  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43323  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43522  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43615  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45969  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45970  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45971  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24030  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24031  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24069  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-28806  ",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu97136454/index.html",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/independent-bios-developers-multiple-vulnerabilities-via-uefi-37438",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022020318",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-73436",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
         {
            db: "NVD",
            id: "CVE-2021-42554",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-107",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
         {
            db: "NVD",
            id: "CVE-2021-42554",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-107",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-01T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
         {
            date: "2022-02-03T02:15:07.380000",
            db: "NVD",
            id: "CVE-2021-42554",
         },
         {
            date: "2022-02-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-107",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-28T07:08:00",
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
         {
            date: "2022-03-08T20:18:59.047000",
            db: "NVD",
            id: "CVE-2021-42554",
         },
         {
            date: "2022-03-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-107",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-107",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-107",
         },
      ],
      trust: 0.6,
   },
}

var-201809-1075
Vulnerability from variot

Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access. Intel CSME The firmware contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple Siemens Products are prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2. A denial-of-service vulnerability 3. A side channel attack information disclosure vulnerability Attackers can exploit these issues to execute arbitrary code within the context of an affected device or obtain sensitive information or cause a denial-of-service condition. The following Siemens products are affected: SIMATIC FieldPG M5 All versions prior to 22.01.06, SIMATIC IPC427E All versions prior to 21.01.09, SIMATIC IPC477E All versions prior to 21.01.09, SIMATIC IPC547E All versions prior to R1.30.0, SIMATIC IPC547G All versions prior to R1.23.0, SIMATIC IPC627D All versions prior to 19.02.11, SIMATIC IPC647D All versions prior to 19.01.14, SIMATIC IPC677D All versions prior to 19.02.11, SIMATIC IPC827D All versions prior to 19.02.11, SIMATIC IPC847D All versions prior to 19.01.14, and SIMATIC ITP1000 All versions prior to 23.01.04. Intel CSME is a converged security management engine developed by Intel Corporation. Intel AMT is one of the active management technology modules. An attacker could cause a denial of service (memory leak) by exploiting this vulnerability

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201809-1075",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic itp1000",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "23.01.04",
         },
         {
            model: "simatic ipc477e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.09",
         },
         {
            model: "active management technology",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "12.0.5",
         },
         {
            model: "simatic ipc827d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.02.11",
         },
         {
            model: "manageability engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "9.0.0.0",
         },
         {
            model: "simatic field pg m5",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "22.01.06",
         },
         {
            model: "simatic pc547g",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "r1.23.0",
         },
         {
            model: "simatic ipc677d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.02.11",
         },
         {
            model: "simatic ipc627d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.02.11",
         },
         {
            model: "simatic ipc427e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.09",
         },
         {
            model: "simatic ipc547e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "r1.30.0",
         },
         {
            model: "converged security management engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "12.0.5",
         },
         {
            model: "manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.0",
         },
         {
            model: "simatic ipc647d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.01.14",
         },
         {
            model: "converged security management engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "11.0.0",
         },
         {
            model: "simatic ipc847d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.01.14",
         },
         {
            model: "csme",
            scope: "lt",
            trust: 0.8,
            vendor: "intel",
            version: "12.0.5",
         },
         {
            model: "converged security management engine",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc847d",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc827d",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc677d",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc647d",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc627d",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc547g",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc547e",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic fieldpg m5",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc847d",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v19.01.14",
         },
         {
            model: "simatic ipc827d",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v19.02.11",
         },
         {
            model: "simatic ipc677d",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v19.01.11",
         },
         {
            model: "simatic ipc647d",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v19.01.14",
         },
         {
            model: "simatic ipc627d",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v19.02.11",
         },
         {
            model: "simatic ipc547g r1.23.0",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc547e r1.30.0",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc477e",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v21.01.09",
         },
         {
            model: "simatic ipc427e",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v21.01.09",
         },
         {
            model: "simatic fieldpg m5",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v22.01.06",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "106996",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-013145",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-604",
         },
         {
            db: "NVD",
            id: "CVE-2018-3658",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/o:intel:csme_firmware",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2018-013145",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported this issue.,Siemens reported these vulnerabilities to NCCIC.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201809-604",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2018-3658",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "CVE-2018-3658",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 5,
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 10,
                  id: "VHN-133689",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "nvd@nist.gov",
                  availabilityImpact: "LOW",
                  baseScore: 5.3,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  exploitabilityScore: 3.9,
                  id: "CVE-2018-3658",
                  impactScore: 1.4,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "Low",
                  baseScore: 5.3,
                  baseSeverity: "Medium",
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "CVE-2018-3658",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2018-3658",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2018-3658",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201809-604",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-133689",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133689",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-013145",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-604",
         },
         {
            db: "NVD",
            id: "CVE-2018-3658",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access. Intel CSME The firmware contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple Siemens Products are prone to the following security vulnerabilities:\n1. Multiple stack-based buffer-overflow vulnerabilities\n2. A denial-of-service vulnerability\n3. A side channel attack information disclosure vulnerability\nAttackers can exploit these issues to execute arbitrary code within the context of an affected device or obtain sensitive information or cause a denial-of-service condition. \nThe following Siemens products are affected:\nSIMATIC FieldPG M5 All versions prior to 22.01.06,\nSIMATIC IPC427E All versions prior to 21.01.09,\nSIMATIC IPC477E All versions prior to 21.01.09,\nSIMATIC IPC547E All versions prior to R1.30.0,\nSIMATIC IPC547G All versions prior to R1.23.0,\nSIMATIC IPC627D All versions prior to 19.02.11,\nSIMATIC IPC647D All versions prior to 19.01.14,\nSIMATIC IPC677D All versions prior to 19.02.11,\nSIMATIC IPC827D All versions prior to 19.02.11,\nSIMATIC IPC847D All versions prior to 19.01.14, and\nSIMATIC ITP1000 All versions prior to 23.01.04. Intel CSME is a converged security management engine developed by Intel Corporation. Intel AMT is one of the active management technology modules. An attacker could cause a denial of service (memory leak) by exploiting this vulnerability",
      sources: [
         {
            db: "NVD",
            id: "CVE-2018-3658",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-013145",
         },
         {
            db: "BID",
            id: "106996",
         },
         {
            db: "VULHUB",
            id: "VHN-133689",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2018-3658",
            trust: 2.8,
         },
         {
            db: "ICS CERT",
            id: "ICSA-19-043-05",
            trust: 2.8,
         },
         {
            db: "BID",
            id: "106996",
            trust: 2,
         },
         {
            db: "SIEMENS",
            id: "SSA-377318",
            trust: 1.7,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-013145",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-604",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.0444",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-133689",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133689",
         },
         {
            db: "BID",
            id: "106996",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-013145",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-604",
         },
         {
            db: "NVD",
            id: "CVE-2018-3658",
         },
      ],
   },
   id: "VAR-201809-1075",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133689",
         },
      ],
      trust: 0.71611305,
   },
   last_update_date: "2024-11-23T21:38:16.943000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INTEL-SA-00141",
            trust: 0.8,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
         },
         {
            title: "Intel CSME Security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=84863",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2018-013145",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-604",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-772",
            trust: 1.1,
         },
         {
            problemtype: "CWE-399",
            trust: 0.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133689",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-013145",
         },
         {
            db: "NVD",
            id: "CVE-2018-3658",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.4,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-19-043-05",
         },
         {
            trust: 2.9,
            url: "http://www.securityfocus.com/bid/106996",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
         },
         {
            trust: 1.7,
            url: "https://security.netapp.com/advisory/ntap-20180924-0003/",
         },
         {
            trust: 1.7,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
         },
         {
            trust: 1.6,
            url: "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03876en_us",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3658",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-3658",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/75474",
         },
         {
            trust: 0.3,
            url: "http://subscriber.communications.siemens.com/",
         },
         {
            trust: 0.1,
            url: "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-hpesbhf03876en_us",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133689",
         },
         {
            db: "BID",
            id: "106996",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-013145",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-604",
         },
         {
            db: "NVD",
            id: "CVE-2018-3658",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-133689",
         },
         {
            db: "BID",
            id: "106996",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-013145",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-604",
         },
         {
            db: "NVD",
            id: "CVE-2018-3658",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-09-12T00:00:00",
            db: "VULHUB",
            id: "VHN-133689",
         },
         {
            date: "2019-02-12T00:00:00",
            db: "BID",
            id: "106996",
         },
         {
            date: "2019-02-15T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2018-013145",
         },
         {
            date: "2018-09-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201809-604",
         },
         {
            date: "2018-09-12T19:29:02.967000",
            db: "NVD",
            id: "CVE-2018-3658",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2019-10-03T00:00:00",
            db: "VULHUB",
            id: "VHN-133689",
         },
         {
            date: "2019-02-12T00:00:00",
            db: "BID",
            id: "106996",
         },
         {
            date: "2019-02-15T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2018-013145",
         },
         {
            date: "2019-10-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201809-604",
         },
         {
            date: "2024-11-21T04:05:51.020000",
            db: "NVD",
            id: "CVE-2018-3658",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201809-604",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Intel CSME Firmware resource management vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2018-013145",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "resource management error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201809-604",
         },
      ],
      trust: 0.6,
   },
}

var-202011-1387
Vulnerability from variot

Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. Intel(R) CSME and TXE Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1387",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.22.80",
         },
         {
            model: "simatic ipc427e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "27.01.05",
         },
         {
            model: "simatic et200sp 1515sp pc2",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "0209.0105",
         },
         {
            model: "sinumerik 840d sl ht 10",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "sinumerik 828d hw pu.4",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "08.00.00.00",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "14.0.45",
         },
         {
            model: "simatic ipc527g",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1.4.0",
         },
         {
            model: "simatic ipc627e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "simatic ipc847e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "simatic ipc647e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "simatic ipc667e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "converged security and manageability engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "12.0",
         },
         {
            model: "simatic ipc127e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "27.01.05",
         },
         {
            model: "simatic itp1000",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "23.01.08",
         },
         {
            model: "simatic drive controller",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "05.00.01.00",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.8.80",
         },
         {
            model: "converged security and manageability engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "14.5.0",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "14.5.25",
         },
         {
            model: "sinumerik mc mcu 1720",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "05.00.00.00",
         },
         {
            model: "sinumerik one",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "sinumerik one ncu 1740",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "04.00.00.00",
         },
         {
            model: "trusted execution technology",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "4.0.30",
         },
         {
            model: "trusted execution technology",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "4.0",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "converged security and manageability engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "14.0",
         },
         {
            model: "sinumerik one ppu 1740",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "06.00.00.00",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.12.80",
         },
         {
            model: "simatic ipc477e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "27.01.05",
         },
         {
            model: "simatic ipc547g",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "r1.30.0",
         },
         {
            model: "simatic field pg m5",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "22.01.08",
         },
         {
            model: "converged security and manageability engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "11.22.0",
         },
         {
            model: "trusted execution technology",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "3.1.80",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "12.0.70",
         },
         {
            model: "converged security and manageability engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "11.12.0",
         },
         {
            model: "trusted execution technology",
            scope: null,
            trust: 0.8,
            vendor: "インテル",
            version: null,
         },
         {
            model: "intel csme",
            scope: null,
            trust: 0.8,
            vendor: "インテル",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            db: "NVD",
            id: "CVE-2020-8745",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemen reported these vulnerabilities to CISA.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201911-1653",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2020-8745",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.6,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "CVE-2020-8745",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.9,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.6,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "VHN-186870",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:L/AC:L/AU:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "PHYSICAL",
                  author: "nvd@nist.gov",
                  availabilityImpact: "HIGH",
                  baseScore: 6.8,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.9,
                  id: "CVE-2020-8745",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Physical",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 6.8,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-8745",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2020-8745",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2020-8745",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201911-1653",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-186870",
                  trust: 0.1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-8745",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186870",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8745",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1653",
         },
         {
            db: "NVD",
            id: "CVE-2020-8745",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. Intel(R) CSME and TXE Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-8745",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            db: "VULHUB",
            id: "VHN-186870",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8745",
         },
      ],
      trust: 1.8,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-8745",
            trust: 2.6,
         },
         {
            db: "SIEMENS",
            id: "SSA-678983",
            trust: 1.8,
         },
         {
            db: "JVN",
            id: "JVNVU91051134",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
            trust: 0.8,
         },
         {
            db: "ICS CERT",
            id: "ICSA-22-132-05",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.3958.2",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.3958",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2022.2355",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-39432",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1653",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-186870",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2020-8745",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186870",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8745",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1653",
         },
         {
            db: "NVD",
            id: "CVE-2020-8745",
         },
      ],
   },
   id: "VAR-202011-1387",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186870",
         },
      ],
      trust: 0.77708335,
   },
   last_update_date: "2024-11-23T21:18:20.183000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INTEL-SA-00391",
            trust: 0.8,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391.html",
         },
         {
            title: "Intel TXE Security vulnerabilities",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=134975",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=0bfef52a44075162940391ee650c313e",
         },
         {
            title: "HP: HPSBHF03703 rev. 1  -  Intel® 2020.2 IPU - CSME, SPS, TXE, AMT, and DAL Security Update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=HPSBHF03703",
         },
         {
            title: "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03703 rev. 4  -  Intel® 2020.2 IPU - CSME, SPS, TXE, AMT, and DAL Security Update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=c2cb4814b580012b6267520bd227e8ae",
         },
         {
            title: "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03703 rev. 4  -  Intel® 2020.2 IPU - CSME, SPS, TXE, AMT, and DAL Security Update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=f5eb680d1c7e445b4a8fdf769d4117b0",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8745",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1653",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
         {
            problemtype: "Improper authority management (CWE-269) [NVD Evaluation ]",
            trust: 0.8,
         },
         {
            problemtype: "CWE-269",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186870",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            db: "NVD",
            id: "CVE-2020-8745",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf",
         },
         {
            trust: 1.8,
            url: "https://security.netapp.com/advisory/ntap-20201113-0002/",
         },
         {
            trust: 1.8,
            url: "https://security.netapp.com/advisory/ntap-20201113-0005/",
         },
         {
            trust: 1.8,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-8745",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu91051134/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.3958/",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-22-132-05",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.3958.2/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2022.2355",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-39432",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/intel-processors-multiple-vulnerabilities-via-csme-sps-txe-amt-dal-33887",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-05",
         },
         {
            trust: 0.1,
            url: "https://support.hp.com/us-en/document/c06962103",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186870",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8745",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1653",
         },
         {
            db: "NVD",
            id: "CVE-2020-8745",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-186870",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8745",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1653",
         },
         {
            db: "NVD",
            id: "CVE-2020-8745",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-11-12T00:00:00",
            db: "VULHUB",
            id: "VHN-186870",
         },
         {
            date: "2020-11-12T00:00:00",
            db: "VULMON",
            id: "CVE-2020-8745",
         },
         {
            date: "2021-07-02T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            date: "2019-11-10T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201911-1653",
         },
         {
            date: "2020-11-12T18:15:17.300000",
            db: "NVD",
            id: "CVE-2020-8745",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-10-14T00:00:00",
            db: "VULHUB",
            id: "VHN-186870",
         },
         {
            date: "2021-07-21T00:00:00",
            db: "VULMON",
            id: "CVE-2020-8745",
         },
         {
            date: "2021-07-02T04:36:00",
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            date: "2022-10-17T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201911-1653",
         },
         {
            date: "2024-11-21T05:39:22.207000",
            db: "NVD",
            id: "CVE-2020-8745",
         },
      ],
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Intel(R) CSME  and  TXE  Vulnerability in privilege management",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201911-1653",
         },
      ],
      trust: 0.6,
   },
}

var-201809-1074
Vulnerability from variot

Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access. Intel CSME The firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Multiple Siemens Products are prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2. A denial-of-service vulnerability 3. A side channel attack information disclosure vulnerability Attackers can exploit these issues to execute arbitrary code within the context of an affected device or obtain sensitive information or cause a denial-of-service condition. The following Siemens products are affected: SIMATIC FieldPG M5 All versions prior to 22.01.06, SIMATIC IPC427E All versions prior to 21.01.09, SIMATIC IPC477E All versions prior to 21.01.09, SIMATIC IPC547E All versions prior to R1.30.0, SIMATIC IPC547G All versions prior to R1.23.0, SIMATIC IPC627D All versions prior to 19.02.11, SIMATIC IPC647D All versions prior to 19.01.14, SIMATIC IPC677D All versions prior to 19.02.11, SIMATIC IPC827D All versions prior to 19.02.11, SIMATIC IPC847D All versions prior to 19.01.14, and SIMATIC ITP1000 All versions prior to 23.01.04. Intel CSME is a converged security management engine developed by Intel Corporation. Intel AMT is one of the active management technology modules

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201809-1074",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "converged security management engine",
            scope: "lt",
            trust: 1.8,
            vendor: "intel",
            version: "12.0.5",
         },
         {
            model: "simatic itp1000",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "23.01.04",
         },
         {
            model: "simatic ipc477e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.09",
         },
         {
            model: "active management technology",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "12.0.5",
         },
         {
            model: "simatic ipc827d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.02.11",
         },
         {
            model: "manageability engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "9.0.0.0",
         },
         {
            model: "simatic field pg m5",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "22.01.06",
         },
         {
            model: "simatic pc547g",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "r1.23.0",
         },
         {
            model: "simatic ipc677d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.02.11",
         },
         {
            model: "simatic ipc627d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.02.11",
         },
         {
            model: "simatic ipc427e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.09",
         },
         {
            model: "simatic ipc547e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "r1.30.0",
         },
         {
            model: "manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.0",
         },
         {
            model: "simatic ipc647d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.01.14",
         },
         {
            model: "converged security management engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "11.0.0",
         },
         {
            model: "simatic ipc847d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.01.14",
         },
         {
            model: "converged security management engine",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc847d",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc827d",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc677d",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc647d",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc627d",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc547g",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc547e",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic fieldpg m5",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc847d",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v19.01.14",
         },
         {
            model: "simatic ipc827d",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v19.02.11",
         },
         {
            model: "simatic ipc677d",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v19.01.11",
         },
         {
            model: "simatic ipc647d",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v19.01.14",
         },
         {
            model: "simatic ipc627d",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v19.02.11",
         },
         {
            model: "simatic ipc547g r1.23.0",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc547e r1.30.0",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc477e",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v21.01.09",
         },
         {
            model: "simatic ipc427e",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v21.01.09",
         },
         {
            model: "simatic fieldpg m5",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v22.01.06",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "106996",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-012408",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-605",
         },
         {
            db: "NVD",
            id: "CVE-2018-3657",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/o:intel:converged_security_management_engine_firmware",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2018-012408",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported this issue.,Siemens reported these vulnerabilities to NCCIC.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201809-605",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2018-3657",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  id: "CVE-2018-3657",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 1.8,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  id: "VHN-133688",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:L/AC:L/AU:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "nvd@nist.gov",
                  availabilityImpact: "HIGH",
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.8,
                  id: "CVE-2018-3657",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 6.7,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2018-3657",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2018-3657",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2018-3657",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201809-605",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-133688",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133688",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-012408",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-605",
         },
         {
            db: "NVD",
            id: "CVE-2018-3657",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access. Intel CSME The firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Multiple Siemens Products are prone to the following security vulnerabilities:\n1. Multiple stack-based buffer-overflow vulnerabilities\n2. A denial-of-service vulnerability\n3. A side channel attack information disclosure vulnerability\nAttackers can exploit these issues to execute arbitrary code within the context of an affected device or obtain sensitive information or cause a denial-of-service condition. \nThe following Siemens products are affected:\nSIMATIC FieldPG M5 All versions prior to 22.01.06,\nSIMATIC IPC427E All versions prior to 21.01.09,\nSIMATIC IPC477E All versions prior to 21.01.09,\nSIMATIC IPC547E All versions prior to R1.30.0,\nSIMATIC IPC547G All versions prior to R1.23.0,\nSIMATIC IPC627D All versions prior to 19.02.11,\nSIMATIC IPC647D All versions prior to 19.01.14,\nSIMATIC IPC677D All versions prior to 19.02.11,\nSIMATIC IPC827D All versions prior to 19.02.11,\nSIMATIC IPC847D All versions prior to 19.01.14, and\nSIMATIC ITP1000 All versions prior to 23.01.04. Intel CSME is a converged security management engine developed by Intel Corporation. Intel AMT is one of the active management technology modules",
      sources: [
         {
            db: "NVD",
            id: "CVE-2018-3657",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-012408",
         },
         {
            db: "BID",
            id: "106996",
         },
         {
            db: "VULHUB",
            id: "VHN-133688",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2018-3657",
            trust: 2.8,
         },
         {
            db: "ICS CERT",
            id: "ICSA-19-043-05",
            trust: 2.8,
         },
         {
            db: "BID",
            id: "106996",
            trust: 2,
         },
         {
            db: "SIEMENS",
            id: "SSA-377318",
            trust: 1.7,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-012408",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-605",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.0444",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-133688",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133688",
         },
         {
            db: "BID",
            id: "106996",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-012408",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-605",
         },
         {
            db: "NVD",
            id: "CVE-2018-3657",
         },
      ],
   },
   id: "VAR-201809-1074",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133688",
         },
      ],
      trust: 0.6769231,
   },
   last_update_date: "2024-11-23T21:38:16.974000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INTEL-SA-00141",
            trust: 0.8,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
         },
         {
            title: "Intel CSME AMT Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=84864",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2018-012408",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-605",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133688",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-012408",
         },
         {
            db: "NVD",
            id: "CVE-2018-3657",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.4,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-19-043-05",
         },
         {
            trust: 2.9,
            url: "http://www.securityfocus.com/bid/106996",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
         },
         {
            trust: 1.7,
            url: "https://security.netapp.com/advisory/ntap-20180924-0003/",
         },
         {
            trust: 1.7,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
         },
         {
            trust: 1.6,
            url: "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03876en_us",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3657",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-3657",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/75474",
         },
         {
            trust: 0.3,
            url: "http://subscriber.communications.siemens.com/",
         },
         {
            trust: 0.1,
            url: "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-hpesbhf03876en_us",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133688",
         },
         {
            db: "BID",
            id: "106996",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-012408",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-605",
         },
         {
            db: "NVD",
            id: "CVE-2018-3657",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-133688",
         },
         {
            db: "BID",
            id: "106996",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-012408",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-605",
         },
         {
            db: "NVD",
            id: "CVE-2018-3657",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-09-12T00:00:00",
            db: "VULHUB",
            id: "VHN-133688",
         },
         {
            date: "2019-02-12T00:00:00",
            db: "BID",
            id: "106996",
         },
         {
            date: "2019-02-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2018-012408",
         },
         {
            date: "2018-09-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201809-605",
         },
         {
            date: "2018-09-12T19:29:02.840000",
            db: "NVD",
            id: "CVE-2018-3657",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2019-02-28T00:00:00",
            db: "VULHUB",
            id: "VHN-133688",
         },
         {
            date: "2019-02-12T00:00:00",
            db: "BID",
            id: "106996",
         },
         {
            date: "2019-02-13T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2018-012408",
         },
         {
            date: "2021-05-27T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201809-605",
         },
         {
            date: "2024-11-21T04:05:50.857000",
            db: "NVD",
            id: "CVE-2018-3657",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201809-605",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Intel CSME Firmware buffer error vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2018-012408",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201809-605",
         },
      ],
      trust: 0.6,
   },
}

var-202202-0129
Vulnerability from variot

An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.08.41, Kernel 5.1 before 05.16.41, Kernel 5.2 before 05.26.41, Kernel 5.3 before 05.35.41, and Kernel 5.4 before 05.42.20. A stack-based buffer overflow leads toarbitrary code execution in UEFI DisplayTypeDxe DXE driver. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count

SMM Privilege Escalation 10

SMM Memory Corruption 12

DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. Insyde InsydeH2O Kernel Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0129",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.2",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.08.41",
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc627e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.0",
         },
         {
            model: "simatic ipc677e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc847e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.35.41",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.4",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc227g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.16.41",
         },
         {
            model: "simatic ipc327g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc127e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.1",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.42.20",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.3",
         },
         {
            model: "simatic ipc277g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.26.41",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc377g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc647e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: null,
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
         {
            db: "NVD",
            id: "CVE-2021-42059",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.08.41",
                        versionStartIncluding: "5.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.16.41",
                        versionStartIncluding: "5.1",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.26.41",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.35.41",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.42.20",
                        versionStartIncluding: "5.4",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc227g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc277g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc327g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc377g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-42059",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This document was written by Vijay Sarvepalli.Statement Date:   March 01, 2022",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2021-42059",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.2,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2021-42059",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 6.7,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-42059",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-42059",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202202-110",
                  trust: 0.6,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
         {
            db: "NVD",
            id: "CVE-2021-42059",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-110",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.08.41, Kernel 5.1 before 05.16.41, Kernel 5.2 before 05.26.41, Kernel 5.3 before 05.35.41, and Kernel 5.4 before 05.42.20. A stack-based buffer overflow leads toarbitrary code execution in UEFI DisplayTypeDxe DXE driver. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count \n\n\n\n\nSMM Privilege Escalation 10 \n\n\n SMM Memory Corruption  12 \n\n\n DXE Memory Corruption 1CVE-2020-27339 Affected\nCVE-2020-5953 Affected\nCVE-2021-33625 Affected\nCVE-2021-33626 Affected\nCVE-2021-33627 Affected\nCVE-2021-41837 Affected\nCVE-2021-41838 Affected\nCVE-2021-41839 Affected\nCVE-2021-41840 Affected\nCVE-2021-41841 Affected\nCVE-2021-42059 Affected\nCVE-2021-42060 Not Affected\nCVE-2021-42113 Affected\nCVE-2021-42554 Affected\nCVE-2021-43323 Affected\nCVE-2021-43522 Affected\nCVE-2021-43615 Not Affected\nCVE-2021-45969 Not Affected\nCVE-2021-45970 Not Affected\nCVE-2021-45971 Not Affected\nCVE-2022-24030 Not Affected\nCVE-2022-24031 Not Affected\nCVE-2022-24069 Not Affected\nCVE-2022-28806 Unknown. Insyde InsydeH2O Kernel Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-42059",
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-42059",
            trust: 4,
         },
         {
            db: "SIEMENS",
            id: "SSA-306654",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97136454",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001350",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2022020322",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-73436",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-110",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
         {
            db: "NVD",
            id: "CVE-2021-42059",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-110",
         },
      ],
   },
   id: "VAR-202202-0129",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2023-12-18T11:01:11.077000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Insyde's Security Pledge Security Advisory",
            trust: 0.8,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            title: "Insyde InsydeH2O Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=180204",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-110",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
         {
            db: "NVD",
            id: "CVE-2021-42059",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
         },
         {
            trust: 1.6,
            url: "https://security.netapp.com/advisory/ntap-20220216-0008/",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge/sa-2022006",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-42059",
         },
         {
            trust: 1,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            trust: 0.8,
            url: "cve-2020-27339  ",
         },
         {
            trust: 0.8,
            url: "cve-2020-5953  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33625  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33626  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33627  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41837  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41838  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41839  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41840  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41841  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42059  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42060  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42113  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42554  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43323  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43522  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43615  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45969  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45970  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45971  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24030  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24031  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24069  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-28806  ",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu97136454/index.html",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/independent-bios-developers-multiple-vulnerabilities-via-uefi-37438",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-73436",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022020322",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
         {
            db: "NVD",
            id: "CVE-2021-42059",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-110",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
         {
            db: "NVD",
            id: "CVE-2021-42059",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-110",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-01T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
         {
            date: "2022-02-03T02:15:07.250000",
            db: "NVD",
            id: "CVE-2021-42059",
         },
         {
            date: "2022-02-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-110",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-28T07:08:00",
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
         {
            date: "2022-04-18T18:02:45.103000",
            db: "NVD",
            id: "CVE-2021-42059",
         },
         {
            date: "2022-03-03T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-110",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-110",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-110",
         },
      ],
      trust: 0.6,
   },
}

var-202202-0009
Vulnerability from variot

An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.09.11, 5.1 before 05.17.11, 5.2 before 05.27.11, 5.3 before 05.36.11, 5.4 before 05.44.11, and 5.5 before 05.52.11 affecting FwBlockServiceSmm. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count

SMM Privilege Escalation 10

SMM Memory Corruption 12

DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. Insyde InsydeH2O Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0009",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.16.29",
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc227g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc377g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.1",
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.0",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.35.29",
         },
         {
            model: "simatic ipc847e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc677e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc277g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc627e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.26.29",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.3",
         },
         {
            model: "simatic ipc647e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc127e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.08.29",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc327g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.2",
         },
         {
            model: "insydeh2o",
            scope: null,
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
         {
            db: "NVD",
            id: "CVE-2021-33627",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.08.29",
                        versionStartIncluding: "5.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.16.29",
                        versionStartIncluding: "5.1",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.26.29",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.35.29",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc227g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc277g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc327g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc377g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-33627",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This document was written by Vijay Sarvepalli.Statement Date:   March 01, 2022",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2021-33627",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.2,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2021-33627",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 8.2,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.5,
                  impactScore: 6,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 8.2,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-33627",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Changed",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-33627",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202202-115",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-115",
         },
         {
            db: "NVD",
            id: "CVE-2021-33627",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.09.11, 5.1 before 05.17.11, 5.2 before 05.27.11, 5.3 before 05.36.11, 5.4 before 05.44.11, and 5.5 before 05.52.11 affecting FwBlockServiceSmm. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count \n\n\n\n\nSMM Privilege Escalation 10 \n\n\n SMM Memory Corruption  12 \n\n\n DXE Memory Corruption 1CVE-2020-27339 Affected\nCVE-2020-5953 Affected\nCVE-2021-33625 Affected\nCVE-2021-33626 Affected\nCVE-2021-33627 Affected\nCVE-2021-41837 Affected\nCVE-2021-41838 Affected\nCVE-2021-41839 Affected\nCVE-2021-41840 Affected\nCVE-2021-41841 Affected\nCVE-2021-42059 Affected\nCVE-2021-42060 Not Affected\nCVE-2021-42113 Affected\nCVE-2021-42554 Affected\nCVE-2021-43323 Affected\nCVE-2021-43522 Affected\nCVE-2021-43615 Not Affected\nCVE-2021-45969 Not Affected\nCVE-2021-45970 Not Affected\nCVE-2021-45971 Not Affected\nCVE-2022-24030 Not Affected\nCVE-2022-24031 Not Affected\nCVE-2022-24069 Not Affected\nCVE-2022-28806 Unknown. Insyde InsydeH2O Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-33627",
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-33627",
            trust: 4,
         },
         {
            db: "SIEMENS",
            id: "SSA-306654",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97136454",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001344",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2022020316",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-73436",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-115",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-115",
         },
         {
            db: "NVD",
            id: "CVE-2021-33627",
         },
      ],
   },
   id: "VAR-202202-0009",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2024-07-23T19:45:56.033000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Insyde's Security Pledge Security Advisory",
            trust: 0.8,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            title: "Insyde InsydeH2O Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=180209",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-115",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1,
         },
         {
            problemtype: "Buffer error (CWE-119) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
         {
            db: "NVD",
            id: "CVE-2021-33627",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://security.netapp.com/advisory/ntap-20220222-0002/",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge/sa-2022022",
         },
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-33627",
         },
         {
            trust: 0.8,
            url: "cve-2020-27339  ",
         },
         {
            trust: 0.8,
            url: "cve-2020-5953  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33625  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33626  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33627  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41837  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41838  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41839  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41840  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41841  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42059  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42060  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42113  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42554  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43323  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43522  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43615  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45969  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45970  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45971  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24030  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24031  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24069  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-28806  ",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu97136454/index.html",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/independent-bios-developers-multiple-vulnerabilities-via-uefi-37438",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-73436",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022020316",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-115",
         },
         {
            db: "NVD",
            id: "CVE-2021-33627",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-115",
         },
         {
            db: "NVD",
            id: "CVE-2021-33627",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-01T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
         {
            date: "2022-02-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-115",
         },
         {
            date: "2022-02-03T02:15:06.983000",
            db: "NVD",
            id: "CVE-2021-33627",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-28T07:09:00",
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
         {
            date: "2022-03-03T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-115",
         },
         {
            date: "2024-07-22T17:15:02.883000",
            db: "NVD",
            id: "CVE-2021-33627",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-115",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-115",
         },
      ],
      trust: 0.6,
   },
}

var-202202-0102
Vulnerability from variot

An issue was discovered in SdHostDriver in the kernel 5.0 through 5.5 in Insyde InsydeH2O. There is an SMM callout that allows an attacker to access the System Management Mode and execute arbitrary code. This occurs because of a Numeric Range Comparison Without a Minimum Check. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count

SMM Privilege Escalation 10

SMM Memory Corruption 12

DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. Insyde InsydeH2O Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0102",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.2",
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc627e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc677e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc847e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.4",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc227g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc327g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc127e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.1",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.3",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.35.42",
         },
         {
            model: "simatic ipc277g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc647e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc377g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.26.42",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.16.42",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.51.42",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.5",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.43.42",
         },
         {
            model: "insydeh2o",
            scope: null,
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
         {
            db: "NVD",
            id: "CVE-2021-41838",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.16.42",
                        versionStartIncluding: "5.1",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.26.42",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.35.42",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.43.42",
                        versionStartIncluding: "5.4",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.51.42",
                        versionStartIncluding: "5.5",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc227g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc277g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc327g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc377g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41838",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This document was written by Vijay Sarvepalli.Statement Date:   March 01, 2022",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2021-41838",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.2,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2021-41838",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 8.2,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.5,
                  impactScore: 6,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 8.2,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-41838",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Changed",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-41838",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202202-112",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
         {
            db: "NVD",
            id: "CVE-2021-41838",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-112",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "An issue was discovered in SdHostDriver in the kernel 5.0 through 5.5 in Insyde InsydeH2O. There is an SMM callout that allows an attacker to access the System Management Mode and execute arbitrary code. This occurs because of a Numeric Range Comparison Without a Minimum Check. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count \n\n\n\n\nSMM Privilege Escalation 10 \n\n\n SMM Memory Corruption  12 \n\n\n DXE Memory Corruption 1CVE-2020-27339 Affected\nCVE-2020-5953 Affected\nCVE-2021-33625 Affected\nCVE-2021-33626 Affected\nCVE-2021-33627 Affected\nCVE-2021-41837 Affected\nCVE-2021-41838 Affected\nCVE-2021-41839 Affected\nCVE-2021-41840 Affected\nCVE-2021-41841 Affected\nCVE-2021-42059 Affected\nCVE-2021-42060 Not Affected\nCVE-2021-42113 Affected\nCVE-2021-42554 Affected\nCVE-2021-43323 Affected\nCVE-2021-43522 Affected\nCVE-2021-43615 Not Affected\nCVE-2021-45969 Not Affected\nCVE-2021-45970 Not Affected\nCVE-2021-45971 Not Affected\nCVE-2022-24030 Not Affected\nCVE-2022-24031 Not Affected\nCVE-2022-24069 Not Affected\nCVE-2022-28806 Unknown. Insyde InsydeH2O Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41838",
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-41838",
            trust: 4,
         },
         {
            db: "SIEMENS",
            id: "SSA-306654",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97136454",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001346",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2022020315",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-73436",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-112",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
         {
            db: "NVD",
            id: "CVE-2021-41838",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-112",
         },
      ],
   },
   id: "VAR-202202-0102",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2023-12-18T11:19:40.640000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Insyde's Security Pledge Security Advisory",
            trust: 0.8,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            title: "Insyde InsydeH2O Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=184451",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-112",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1,
         },
         {
            problemtype: "Buffer error (CWE-119) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
         {
            db: "NVD",
            id: "CVE-2021-41838",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
         },
         {
            trust: 1.6,
            url: "https://security.netapp.com/advisory/ntap-20220222-0001/",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge/sa-2022023",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-41838",
         },
         {
            trust: 0.8,
            url: "cve-2020-27339  ",
         },
         {
            trust: 0.8,
            url: "cve-2020-5953  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33625  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33626  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33627  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41837  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41838  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41839  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41840  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41841  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42059  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42060  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42113  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42554  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43323  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43522  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43615  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45969  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45970  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45971  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24030  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24031  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24069  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-28806  ",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu97136454/index.html",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/independent-bios-developers-multiple-vulnerabilities-via-uefi-37438",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022020315",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-73436",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
         {
            db: "NVD",
            id: "CVE-2021-41838",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-112",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
         {
            db: "NVD",
            id: "CVE-2021-41838",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-112",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-01T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
         {
            date: "2022-02-03T02:15:07.080000",
            db: "NVD",
            id: "CVE-2021-41838",
         },
         {
            date: "2022-02-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-112",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-28T07:09:00",
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
         {
            date: "2022-03-01T19:42:25.170000",
            db: "NVD",
            id: "CVE-2021-41838",
         },
         {
            date: "2022-03-10T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-112",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-112",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-112",
         },
      ],
      trust: 0.6,
   },
}

var-201711-0651
Vulnerability from variot

Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege. Intel Manageability Engine The Intel Management Engine is Intel's thermal management driver for its desktop family of chipsets. Failed exploits may result in denial-of-service conditions. Intel Manageability Engine versions 8.x, 9.x, 10.x, 11.0,11.5, 11.6, 11.7, 11.10, and 11.20 are vulnerable. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. Active Management Technology (AMT) is one of the active management components. The following products and firmware are affected: Intel Manageability Engine Firmware Version 8.x, Version 9.x, Version 10.x, Version 11.0, Version 11.5, Version 11.6, Version 11.7, Version 11.10, Version 11.20; Intel 6th, 7th and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201711-0651",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "manageability engine",
            scope: "eq",
            trust: 2.5,
            vendor: "intel",
            version: "11.7",
         },
         {
            model: "manageability engine",
            scope: "eq",
            trust: 2.5,
            vendor: "intel",
            version: "11.6",
         },
         {
            model: "manageability engine",
            scope: "eq",
            trust: 2.5,
            vendor: "intel",
            version: "11.5",
         },
         {
            model: "manageability engine",
            scope: "eq",
            trust: 2.5,
            vendor: "intel",
            version: "11.20",
         },
         {
            model: "manageability engine",
            scope: "eq",
            trust: 2.5,
            vendor: "intel",
            version: "11.10",
         },
         {
            model: "manageability engine",
            scope: "eq",
            trust: 2.5,
            vendor: "intel",
            version: "11.0",
         },
         {
            model: "active management technology",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc827c",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.2.61.3535",
         },
         {
            model: "rog maximus ix extreme",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "sinumerik pcu50.5-p",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.2.61.3535",
         },
         {
            model: "b150m-c",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z270h gaming\\/k1",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "q170t v2",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simotion p320-4s",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "17.02.06.83.1",
         },
         {
            model: "rog strix z270i gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b250 mining expert",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime j3355i-c",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "ex-b150m-v3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "q170m2",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z370-i gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170m-e d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime b250m-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "sabertooth z170 mark 1",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150 pro gaming\\/aura",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h170-plus d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z370-h gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "q170t",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-c2\\/tf",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus x code",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "manageability engine",
            scope: "lte",
            trust: 1,
            vendor: "intel",
            version: "9.1.41.3024",
         },
         {
            model: "manageability engine",
            scope: "lte",
            trust: 1,
            vendor: "intel",
            version: "10.0.55.3000",
         },
         {
            model: "h110m-c2",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z370-e gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc547d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "7.1.91.3272",
         },
         {
            model: "prime z270-p",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z270h gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "tuf z370-plus gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h170 pro gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc627c",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.2.61.3535",
         },
         {
            model: "prime z270-k",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc677d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "9.1.41.3024",
         },
         {
            model: "b150m-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc847c",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.2.61.3535",
         },
         {
            model: "h110i-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-ks",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170i pro gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-e\\/m.2",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime h110m-p",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h170m-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-c",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc827d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "9.1.41.3024",
         },
         {
            model: "z170m-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b250-mr",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "pio-b250i",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-c\\/hdmi",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b250m-f plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime b250m-d",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170-p",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus ix formula",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc477d",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic field pg m5",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "22.01.04",
         },
         {
            model: "rog strix b250f gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h170m-plus\\/br",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170 pro gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-a\\/dp",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150-pro d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime h110m2\\/fpt",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc647d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "9.1.41.3024",
         },
         {
            model: "z170-ar",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h170-pro\\/usb 3.1",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-k x",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic itp1000",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "23.01.03",
         },
         {
            model: "rog maximus ix hero",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h170i-pro",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-cs",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z270f gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "manageability engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "9.0.0.0",
         },
         {
            model: "ex-h110m-v",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus x formula",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "manageability engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "8.0.0.0",
         },
         {
            model: "manageability engine",
            scope: "lte",
            trust: 1,
            vendor: "intel",
            version: "8.1.71.3608",
         },
         {
            model: "b150-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-a d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170-k",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime h270-pro",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc477d pro",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "h170-pro",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-ts",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m pro gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime b250-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-v plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "q170m-cm-b",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z370-g gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "ex-b250-v7",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-k d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-ks r1",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus viii gene",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110s2",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "ex-b250m-v",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime b250m-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus viii formula",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-c\\/br",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "q170s1",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "tuf z370-pro gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime z270-ar",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-d",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc627d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "9.1.41.3024",
         },
         {
            model: "ex-h110m-v3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime z270m-plus\\/br",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170-deluxe",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "q170m-c",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "ex-b250m-v3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "tuf z270 mark 2",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170-p d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix b250g gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix h270f gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-k d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus ix apex",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc647c",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.2.61.3535",
         },
         {
            model: "b150m-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-e",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-r",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime z270-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc847d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "9.1.41.3024",
         },
         {
            model: "rog maximus viii ranger",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-f",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-f plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-a\\/m.2",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix b250h gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z370-f gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "pio-b150m",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150 pro gaming d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "tuf z270 mark 1",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus viii hero alpha",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic field pg m4",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "18.01.06",
         },
         {
            model: "z170-pro",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z270e gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus viii extreme",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150i pro gaming\\/aura",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus viii hero",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150i pro gaming\\/wifi\\/aura",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-a d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "q170m2\\/cdm\\/si",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170m-plus\\/br",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "trooper h110 d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime b250-pro",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170 pro gaming\\/aura",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime q270m-c",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime z370-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-plus d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "trooper b150 d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime h270-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc427e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.07",
         },
         {
            model: "h110m-d\\/exper\\/si",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime z270m-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime h110m2",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150 pro gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-a\\/m.2",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110t-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170-premium",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110s1",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-cs x",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime b250m-plus\\/br",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "ex-b150m-v5",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime z370-p",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime b250-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150-pro",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "sabertooth z170 s",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-c\\/br",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-c\\/ps",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-k",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-cs\\/br",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus x hero",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus ix code",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170-e",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic field pg m3",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.2.61.3535",
         },
         {
            model: "prime b250m-k",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus x apex",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "q270m-cm-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc677c",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.2.61.3535",
         },
         {
            model: "h170m-e d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b250-s",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc427d",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "ex-b250m-v5",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "sinumerik pcu50.5-c",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.2.61.3535",
         },
         {
            model: "h110m-p\\/dvi",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix b250i gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-c d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110t",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b250m-c pro",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-k",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime h270m-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc547e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "9.1.41.3024",
         },
         {
            model: "rog strix h270i gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-d",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "manageability engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "10.0.0.0",
         },
         {
            model: "rog maximus viii impact",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc477e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.07",
         },
         {
            model: "ex-b150-v7",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "ex-b150m-v",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime b250m-c",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "q270-s",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z270g gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime b250m-j",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "manageability engine",
            scope: "eq",
            trust: 0.9,
            vendor: "intel",
            version: "9.0",
         },
         {
            model: "manageability engine",
            scope: "eq",
            trust: 0.9,
            vendor: "intel",
            version: "8.0",
         },
         {
            model: "manageability engine",
            scope: "eq",
            trust: 0.9,
            vendor: "intel",
            version: "10.0",
         },
         {
            model: "active management technology",
            scope: null,
            trust: 0.8,
            vendor: "intel",
            version: null,
         },
         {
            model: "manageability engine",
            scope: null,
            trust: 0.8,
            vendor: "intel",
            version: null,
         },
         {
            model: null,
            scope: "eq",
            trust: 0.6,
            vendor: "manageability engine",
            version: "*",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.2,
            vendor: "manageability engine",
            version: "11.0",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.2,
            vendor: "manageability engine",
            version: "11.5",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.2,
            vendor: "manageability engine",
            version: "11.6",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.2,
            vendor: "manageability engine",
            version: "11.7",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.2,
            vendor: "manageability engine",
            version: "11.10",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.2,
            vendor: "manageability engine",
            version: "11.20",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.2,
            vendor: "active management",
            version: null,
         },
      ],
      sources: [
         {
            db: "IVD",
            id: "e2e06b61-39ab-11e9-9e0b-000c29342cb1",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37852",
         },
         {
            db: "BID",
            id: "101920",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010525",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-880",
         },
         {
            db: "NVD",
            id: "CVE-2017-5712",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/o:intel:active_management_technology_firmware",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:intel:manageability_engine_firmware",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-010525",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported this issue.",
      sources: [
         {
            db: "BID",
            id: "101920",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2017-5712",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "COMPLETE",
                  baseScore: 9,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 8,
                  id: "CVE-2017-5712",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 1.8,
                  vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 9,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 8,
                  id: "CNVD-2017-37852",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "IVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 9,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 8,
                  id: "e2e06b61-39ab-11e9-9e0b-000c29342cb1",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.2,
                  vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C",
                  version: "2.9 [IVD]",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "SINGLE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 9,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 8,
                  id: "VHN-113915",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:S/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  author: "nvd@nist.gov",
                  availabilityImpact: "HIGH",
                  baseScore: 7.2,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.2,
                  id: "CVE-2017-5712",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.2,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2017-5712",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2017-5712",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "CVE-2017-5712",
                  trust: 0.8,
                  value: "High",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-37852",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201711-880",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "IVD",
                  id: "e2e06b61-39ab-11e9-9e0b-000c29342cb1",
                  trust: 0.2,
                  value: "CRITICAL",
               },
               {
                  author: "VULHUB",
                  id: "VHN-113915",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "IVD",
            id: "e2e06b61-39ab-11e9-9e0b-000c29342cb1",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37852",
         },
         {
            db: "VULHUB",
            id: "VHN-113915",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010525",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-880",
         },
         {
            db: "NVD",
            id: "CVE-2017-5712",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege. Intel Manageability Engine The Intel Management Engine is Intel's thermal management driver for its desktop family of chipsets. Failed  exploits  may result in denial-of-service  conditions. \nIntel Manageability Engine versions 8.x, 9.x, 10.x, 11.0,11.5, 11.6, 11.7, 11.10, and 11.20 are vulnerable. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. Active Management Technology (AMT) is one of the active management components. The following products and firmware are affected: Intel Manageability Engine Firmware Version 8.x, Version 9.x, Version 10.x, Version 11.0, Version 11.5, Version 11.6, Version 11.7, Version 11.10, Version 11.20; Intel 6th, 7th and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors",
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-5712",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010525",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37852",
         },
         {
            db: "BID",
            id: "101920",
         },
         {
            db: "IVD",
            id: "e2e06b61-39ab-11e9-9e0b-000c29342cb1",
         },
         {
            db: "VULHUB",
            id: "VHN-113915",
         },
      ],
      trust: 2.7,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2017-5712",
            trust: 3.6,
         },
         {
            db: "BID",
            id: "101920",
            trust: 2.6,
         },
         {
            db: "SECTRACK",
            id: "1039852",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-892715",
            trust: 1.7,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-880",
            trust: 0.9,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37852",
            trust: 0.8,
         },
         {
            db: "ICS CERT",
            id: "ICSA-18-060-01",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010525",
            trust: 0.8,
         },
         {
            db: "IVD",
            id: "E2E06B61-39AB-11E9-9E0B-000C29342CB1",
            trust: 0.2,
         },
         {
            db: "VULHUB",
            id: "VHN-113915",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "IVD",
            id: "e2e06b61-39ab-11e9-9e0b-000c29342cb1",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37852",
         },
         {
            db: "VULHUB",
            id: "VHN-113915",
         },
         {
            db: "BID",
            id: "101920",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010525",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-880",
         },
         {
            db: "NVD",
            id: "CVE-2017-5712",
         },
      ],
   },
   id: "VAR-201711-0651",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "IVD",
            id: "e2e06b61-39ab-11e9-9e0b-000c29342cb1",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37852",
         },
         {
            db: "VULHUB",
            id: "VHN-113915",
         },
      ],
      trust: 1.48846155,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "ICS",
            ],
            sub_category: null,
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "IVD",
            id: "e2e06b61-39ab-11e9-9e0b-000c29342cb1",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37852",
         },
      ],
   },
   last_update_date: "2024-11-23T21:53:34.178000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INTEL-SA-00086",
            trust: 0.8,
            url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr",
         },
         {
            title: "NTAP-20171120-0001",
            trust: 0.8,
            url: "https://security.netapp.com/advisory/ntap-20171120-0001/",
         },
         {
            title: "Patch for Intel Manageability Engine Buffer Overflow Vulnerability (CNVD-2017-37852)",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchInfo/show/111453",
         },
         {
            title: "Multiple Intel product Intel Manageability Engine Firmware Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=76612",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37852",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010525",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-880",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-113915",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010525",
         },
         {
            db: "NVD",
            id: "CVE-2017-5712",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.5,
            url: "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00086&languageid=en-fr",
         },
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/101920",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf",
         },
         {
            trust: 1.7,
            url: "https://security.netapp.com/advisory/ntap-20171120-0001/",
         },
         {
            trust: 1.7,
            url: "https://www.asus.com/news/wzeltg5cjyaiwgj0",
         },
         {
            trust: 1.7,
            url: "http://www.securitytracker.com/id/1039852",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5712",
         },
         {
            trust: 0.8,
            url: "https://www.us-cert.gov/ics/advisories/icsa-18-060-01",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-5712",
         },
         {
            trust: 0.3,
            url: "http://www.intel.com/content/www/us/en/homepage.html",
         },
         {
            trust: 0.1,
            url: "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00086&amp;languageid=en-fr",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37852",
         },
         {
            db: "VULHUB",
            id: "VHN-113915",
         },
         {
            db: "BID",
            id: "101920",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010525",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-880",
         },
         {
            db: "NVD",
            id: "CVE-2017-5712",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "IVD",
            id: "e2e06b61-39ab-11e9-9e0b-000c29342cb1",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37852",
         },
         {
            db: "VULHUB",
            id: "VHN-113915",
         },
         {
            db: "BID",
            id: "101920",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010525",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-880",
         },
         {
            db: "NVD",
            id: "CVE-2017-5712",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-22T00:00:00",
            db: "IVD",
            id: "e2e06b61-39ab-11e9-9e0b-000c29342cb1",
         },
         {
            date: "2017-12-22T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-37852",
         },
         {
            date: "2017-11-21T00:00:00",
            db: "VULHUB",
            id: "VHN-113915",
         },
         {
            date: "2017-11-20T00:00:00",
            db: "BID",
            id: "101920",
         },
         {
            date: "2017-12-18T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-010525",
         },
         {
            date: "2017-11-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201711-880",
         },
         {
            date: "2017-11-21T14:29:00.540000",
            db: "NVD",
            id: "CVE-2017-5712",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-22T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-37852",
         },
         {
            date: "2018-05-11T00:00:00",
            db: "VULHUB",
            id: "VHN-113915",
         },
         {
            date: "2017-12-19T22:00:00",
            db: "BID",
            id: "101920",
         },
         {
            date: "2019-07-10T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-010525",
         },
         {
            date: "2023-05-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201711-880",
         },
         {
            date: "2024-11-21T03:28:16.610000",
            db: "NVD",
            id: "CVE-2017-5712",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201711-880",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Intel Manageability Engine Firmware of  Active Management Technology Buffer error vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-010525",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201711-880",
         },
      ],
      trust: 0.6,
   },
}

var-201711-0650
Vulnerability from variot

Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege. Intel Manageability Engine The Intel Management Engine is Intel's thermal management driver for its desktop family of chipsets. Failed exploit attempts will likely result in denial-of-service conditions. Intel Manageability Engine versions 8.x, 9.x, 10.x, 11.0,11.5,11.6,11.7,11.10, and 11.20 are vulnerable. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. Active Management Technology (AMT) is one of the active management components. The following products and versions are affected: Intel Manageability Engine Firmware Versions 8.x, 9.x, 10.x, 11.0, 11.5, 11.6, 11.7, 11.10, 11.20; 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201711-0650",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "manageability engine",
            scope: "eq",
            trust: 2.5,
            vendor: "intel",
            version: "11.7",
         },
         {
            model: "manageability engine",
            scope: "eq",
            trust: 2.5,
            vendor: "intel",
            version: "11.6",
         },
         {
            model: "manageability engine",
            scope: "eq",
            trust: 2.5,
            vendor: "intel",
            version: "11.5",
         },
         {
            model: "manageability engine",
            scope: "eq",
            trust: 2.5,
            vendor: "intel",
            version: "11.20",
         },
         {
            model: "manageability engine",
            scope: "eq",
            trust: 2.5,
            vendor: "intel",
            version: "11.10",
         },
         {
            model: "manageability engine",
            scope: "eq",
            trust: 2.5,
            vendor: "intel",
            version: "11.0",
         },
         {
            model: "active management technology",
            scope: "eq",
            trust: 1.6,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc827c",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.2.61.3535",
         },
         {
            model: "rog maximus ix extreme",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "sinumerik pcu50.5-p",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.2.61.3535",
         },
         {
            model: "b150m-c",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z270h gaming\\/k1",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "q170t v2",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simotion p320-4s",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "17.02.06.83.1",
         },
         {
            model: "rog strix z270i gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b250 mining expert",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime j3355i-c",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "ex-b150m-v3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "q170m2",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z370-i gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170m-e d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime b250m-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "sabertooth z170 mark 1",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150 pro gaming\\/aura",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h170-plus d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z370-h gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "q170t",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-c2\\/tf",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus x code",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "manageability engine",
            scope: "lte",
            trust: 1,
            vendor: "intel",
            version: "9.1.41.3024",
         },
         {
            model: "manageability engine",
            scope: "lte",
            trust: 1,
            vendor: "intel",
            version: "10.0.55.3000",
         },
         {
            model: "h110m-c2",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z370-e gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc547d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "7.1.91.3272",
         },
         {
            model: "prime z270-p",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z270h gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "tuf z370-plus gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h170 pro gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc627c",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.2.61.3535",
         },
         {
            model: "prime z270-k",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc677d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "9.1.41.3024",
         },
         {
            model: "b150m-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc847c",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.2.61.3535",
         },
         {
            model: "h110i-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-ks",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170i pro gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-e\\/m.2",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime h110m-p",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h170m-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-c",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc827d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "9.1.41.3024",
         },
         {
            model: "z170m-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b250-mr",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "pio-b250i",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-c\\/hdmi",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b250m-f plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime b250m-d",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170-p",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus ix formula",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc477d",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic field pg m5",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "22.01.04",
         },
         {
            model: "rog strix b250f gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h170m-plus\\/br",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170 pro gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-a\\/dp",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150-pro d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime h110m2\\/fpt",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc647d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "9.1.41.3024",
         },
         {
            model: "z170-ar",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h170-pro\\/usb 3.1",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-k x",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic itp1000",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "23.01.03",
         },
         {
            model: "rog maximus ix hero",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h170i-pro",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-cs",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z270f gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "manageability engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "9.0.0.0",
         },
         {
            model: "ex-h110m-v",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus x formula",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "manageability engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "8.0.0.0",
         },
         {
            model: "manageability engine",
            scope: "lte",
            trust: 1,
            vendor: "intel",
            version: "8.1.71.3608",
         },
         {
            model: "b150-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-a d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170-k",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime h270-pro",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc477d pro",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "h170-pro",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-ts",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m pro gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime b250-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-v plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "q170m-cm-b",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z370-g gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "ex-b250-v7",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-k d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-ks r1",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus viii gene",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110s2",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "ex-b250m-v",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime b250m-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus viii formula",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-c\\/br",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "q170s1",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "tuf z370-pro gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime z270-ar",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-d",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc627d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "9.1.41.3024",
         },
         {
            model: "ex-h110m-v3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime z270m-plus\\/br",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170-deluxe",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "q170m-c",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "ex-b250m-v3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "tuf z270 mark 2",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170-p d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix b250g gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix h270f gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-k d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus ix apex",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc647c",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.2.61.3535",
         },
         {
            model: "b150m-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-e",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-r",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime z270-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc847d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "9.1.41.3024",
         },
         {
            model: "rog maximus viii ranger",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-f",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-f plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-a\\/m.2",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix b250h gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z370-f gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "pio-b150m",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150 pro gaming d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "tuf z270 mark 1",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus viii hero alpha",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic field pg m4",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "18.01.06",
         },
         {
            model: "z170-pro",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z270e gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus viii extreme",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150i pro gaming\\/aura",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus viii hero",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150i pro gaming\\/wifi\\/aura",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-a d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "q170m2\\/cdm\\/si",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170m-plus\\/br",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "trooper h110 d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime b250-pro",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170 pro gaming\\/aura",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime q270m-c",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime z370-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-plus d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "trooper b150 d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime h270-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc427e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.07",
         },
         {
            model: "h110m-d\\/exper\\/si",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime z270m-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime h110m2",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150 pro gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-a\\/m.2",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110t-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170-premium",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110s1",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-cs x",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime b250m-plus\\/br",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "ex-b150m-v5",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime z370-p",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime b250-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150-pro",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "sabertooth z170 s",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-c\\/br",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-c\\/ps",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-k",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-cs\\/br",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus x hero",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus ix code",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "z170-e",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic field pg m3",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.2.61.3535",
         },
         {
            model: "prime b250m-k",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog maximus x apex",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "q270m-cm-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc677c",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.2.61.3535",
         },
         {
            model: "h170m-e d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b250-s",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc427d",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "ex-b250m-v5",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "sinumerik pcu50.5-c",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "6.2.61.3535",
         },
         {
            model: "h110m-p\\/dvi",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix b250i gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-c d3",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110t",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b250m-c pro",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "b150m-k",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime h270m-plus",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc547e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "9.1.41.3024",
         },
         {
            model: "rog strix h270i gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-d",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "manageability engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "10.0.0.0",
         },
         {
            model: "rog maximus viii impact",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "simatic ipc477e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.07",
         },
         {
            model: "ex-b150-v7",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "ex-b150m-v",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime b250m-c",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "q270-s",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "rog strix z270g gaming",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "prime b250m-j",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "h110m-a",
            scope: "eq",
            trust: 1,
            vendor: "asus",
            version: null,
         },
         {
            model: "manageability engine",
            scope: "eq",
            trust: 0.9,
            vendor: "intel",
            version: "9.0",
         },
         {
            model: "manageability engine",
            scope: "eq",
            trust: 0.9,
            vendor: "intel",
            version: "8.0",
         },
         {
            model: "manageability engine",
            scope: "eq",
            trust: 0.9,
            vendor: "intel",
            version: "10.0",
         },
         {
            model: "active management technology",
            scope: null,
            trust: 0.8,
            vendor: "intel",
            version: null,
         },
         {
            model: "manageability engine",
            scope: null,
            trust: 0.8,
            vendor: "intel",
            version: null,
         },
         {
            model: null,
            scope: "eq",
            trust: 0.6,
            vendor: "manageability engine",
            version: "*",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.2,
            vendor: "manageability engine",
            version: "11.0",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.2,
            vendor: "manageability engine",
            version: "11.5",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.2,
            vendor: "manageability engine",
            version: "11.6",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.2,
            vendor: "manageability engine",
            version: "11.7",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.2,
            vendor: "manageability engine",
            version: "11.10",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.2,
            vendor: "manageability engine",
            version: "11.20",
         },
         {
            model: null,
            scope: "eq",
            trust: 0.2,
            vendor: "active management",
            version: null,
         },
      ],
      sources: [
         {
            db: "IVD",
            id: "e2e04451-39ab-11e9-b6f1-000c29342cb1",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37851",
         },
         {
            db: "BID",
            id: "101918",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010467",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-881",
         },
         {
            db: "NVD",
            id: "CVE-2017-5711",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/o:intel:active_management_technology_firmware",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/o:intel:manageability_engine_firmware",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-010467",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported this issue.",
      sources: [
         {
            db: "BID",
            id: "101918",
         },
      ],
      trust: 0.3,
   },
   cve: "CVE-2017-5711",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  id: "CVE-2017-5711",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 1.8,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "CNVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  id: "CNVD-2017-37851",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.6,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "IVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  id: "e2e04451-39ab-11e9-b6f1-000c29342cb1",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.2,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.9 [IVD]",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  id: "VHN-113914",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:L/AC:L/AU:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "nvd@nist.gov",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2017-5711",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2017-5711",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "Low",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2017-5711",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "CVE-2017-5711",
                  trust: 0.8,
                  value: "High",
               },
               {
                  author: "CNVD",
                  id: "CNVD-2017-37851",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201711-881",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "IVD",
                  id: "e2e04451-39ab-11e9-b6f1-000c29342cb1",
                  trust: 0.2,
                  value: "HIGH",
               },
               {
                  author: "VULHUB",
                  id: "VHN-113914",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "IVD",
            id: "e2e04451-39ab-11e9-b6f1-000c29342cb1",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37851",
         },
         {
            db: "VULHUB",
            id: "VHN-113914",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010467",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-881",
         },
         {
            db: "NVD",
            id: "CVE-2017-5711",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege. Intel Manageability Engine The Intel Management Engine is Intel's thermal management driver for its desktop family of chipsets. Failed exploit attempts will likely result in denial-of-service conditions. \nIntel Manageability Engine versions 8.x, 9.x, 10.x, 11.0,11.5,11.6,11.7,11.10, and 11.20 are vulnerable. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. Active Management Technology (AMT) is one of the active management components. The following products and versions are affected: Intel Manageability Engine Firmware Versions 8.x, 9.x, 10.x, 11.0, 11.5, 11.6, 11.7, 11.10, 11.20; 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors",
      sources: [
         {
            db: "NVD",
            id: "CVE-2017-5711",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010467",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37851",
         },
         {
            db: "BID",
            id: "101918",
         },
         {
            db: "IVD",
            id: "e2e04451-39ab-11e9-b6f1-000c29342cb1",
         },
         {
            db: "VULHUB",
            id: "VHN-113914",
         },
      ],
      trust: 2.7,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2017-5711",
            trust: 3.6,
         },
         {
            db: "BID",
            id: "101918",
            trust: 2.6,
         },
         {
            db: "SECTRACK",
            id: "1039852",
            trust: 1.7,
         },
         {
            db: "SIEMENS",
            id: "SSA-892715",
            trust: 1.7,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-881",
            trust: 0.9,
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37851",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010467",
            trust: 0.8,
         },
         {
            db: "IVD",
            id: "E2E04451-39AB-11E9-B6F1-000C29342CB1",
            trust: 0.2,
         },
         {
            db: "VULHUB",
            id: "VHN-113914",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "IVD",
            id: "e2e04451-39ab-11e9-b6f1-000c29342cb1",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37851",
         },
         {
            db: "VULHUB",
            id: "VHN-113914",
         },
         {
            db: "BID",
            id: "101918",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010467",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-881",
         },
         {
            db: "NVD",
            id: "CVE-2017-5711",
         },
      ],
   },
   id: "VAR-201711-0650",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "IVD",
            id: "e2e04451-39ab-11e9-b6f1-000c29342cb1",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37851",
         },
         {
            db: "VULHUB",
            id: "VHN-113914",
         },
      ],
      trust: 1.48846155,
   },
   iot_taxonomy: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            category: [
               "ICS",
            ],
            sub_category: null,
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "IVD",
            id: "e2e04451-39ab-11e9-b6f1-000c29342cb1",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37851",
         },
      ],
   },
   last_update_date: "2024-11-23T21:53:37.809000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INTEL-SA-00086",
            trust: 0.8,
            url: "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr",
         },
         {
            title: "NTAP-20171120-0001",
            trust: 0.8,
            url: "https://security.netapp.com/advisory/ntap-20171120-0001/",
         },
         {
            title: "Intel Manageability Engine has multiple patches for local buffer overflow vulnerabilities",
            trust: 0.6,
            url: "https://www.cnvd.org.cn/patchInfo/show/111455",
         },
         {
            title: "Multiple Intel product Manageability Engine Firmware Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=76613",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37851",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010467",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-881",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-113914",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010467",
         },
         {
            db: "NVD",
            id: "CVE-2017-5711",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.5,
            url: "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00086&languageid=en-fr",
         },
         {
            trust: 1.7,
            url: "http://www.securityfocus.com/bid/101918",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf",
         },
         {
            trust: 1.7,
            url: "https://security.netapp.com/advisory/ntap-20171120-0001/",
         },
         {
            trust: 1.7,
            url: "https://www.asus.com/news/wzeltg5cjyaiwgj0",
         },
         {
            trust: 1.7,
            url: "http://www.securitytracker.com/id/1039852",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5711",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2017-5711",
         },
         {
            trust: 0.3,
            url: "http://www.intel.com/content/www/us/en/homepage.html",
         },
         {
            trust: 0.1,
            url: "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00086&amp;languageid=en-fr",
         },
      ],
      sources: [
         {
            db: "CNVD",
            id: "CNVD-2017-37851",
         },
         {
            db: "VULHUB",
            id: "VHN-113914",
         },
         {
            db: "BID",
            id: "101918",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010467",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-881",
         },
         {
            db: "NVD",
            id: "CVE-2017-5711",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "IVD",
            id: "e2e04451-39ab-11e9-b6f1-000c29342cb1",
         },
         {
            db: "CNVD",
            id: "CNVD-2017-37851",
         },
         {
            db: "VULHUB",
            id: "VHN-113914",
         },
         {
            db: "BID",
            id: "101918",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2017-010467",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-881",
         },
         {
            db: "NVD",
            id: "CVE-2017-5711",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-22T00:00:00",
            db: "IVD",
            id: "e2e04451-39ab-11e9-b6f1-000c29342cb1",
         },
         {
            date: "2017-12-22T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-37851",
         },
         {
            date: "2017-11-21T00:00:00",
            db: "VULHUB",
            id: "VHN-113914",
         },
         {
            date: "2017-11-20T00:00:00",
            db: "BID",
            id: "101918",
         },
         {
            date: "2017-12-14T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-010467",
         },
         {
            date: "2017-11-22T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201711-881",
         },
         {
            date: "2017-11-21T14:29:00.510000",
            db: "NVD",
            id: "CVE-2017-5711",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2017-12-22T00:00:00",
            db: "CNVD",
            id: "CNVD-2017-37851",
         },
         {
            date: "2018-05-11T00:00:00",
            db: "VULHUB",
            id: "VHN-113914",
         },
         {
            date: "2017-12-19T22:00:00",
            db: "BID",
            id: "101918",
         },
         {
            date: "2017-12-14T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2017-010467",
         },
         {
            date: "2023-05-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201711-881",
         },
         {
            date: "2024-11-21T03:28:16.290000",
            db: "NVD",
            id: "CVE-2017-5711",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "BID",
            id: "101918",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201711-881",
         },
      ],
      trust: 0.9,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Intel Manageability Engine Firmware of  Active Management Technology Buffer error vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2017-010467",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201711-881",
         },
      ],
      trust: 0.6,
   },
}

var-201809-1104
Vulnerability from variot

Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network. Intel Active Management Technology Contains a cryptographic vulnerability.Information may be obtained. Multiple Siemens Products are prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2. A denial-of-service vulnerability 3. A side channel attack information disclosure vulnerability Attackers can exploit these issues to execute arbitrary code within the context of an affected device or obtain sensitive information or cause a denial-of-service condition. The following Siemens products are affected: SIMATIC FieldPG M5 All versions prior to 22.01.06, SIMATIC IPC427E All versions prior to 21.01.09, SIMATIC IPC477E All versions prior to 21.01.09, SIMATIC IPC547E All versions prior to R1.30.0, SIMATIC IPC547G All versions prior to R1.23.0, SIMATIC IPC627D All versions prior to 19.02.11, SIMATIC IPC647D All versions prior to 19.01.14, SIMATIC IPC677D All versions prior to 19.02.11, SIMATIC IPC827D All versions prior to 19.02.11, SIMATIC IPC847D All versions prior to 19.01.14, and SIMATIC ITP1000 All versions prior to 23.01.04. A security vulnerability exists in the TLS implementation in versions prior to Intel AMT 12.0.5

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-201809-1104",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "active management technology",
            scope: "lt",
            trust: 1.8,
            vendor: "intel",
            version: "12.0.5",
         },
         {
            model: "simatic itp1000",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "23.01.04",
         },
         {
            model: "simatic ipc477e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.09",
         },
         {
            model: "manageability engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "9.0.0.0",
         },
         {
            model: "simatic ipc827d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.02.11",
         },
         {
            model: "simatic field pg m5",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "22.01.06",
         },
         {
            model: "simatic pc547g",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "r1.23.0",
         },
         {
            model: "simatic ipc627d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.02.11",
         },
         {
            model: "simatic ipc677d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.02.11",
         },
         {
            model: "simatic ipc427e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.09",
         },
         {
            model: "converged security management engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "12.0.5",
         },
         {
            model: "manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.0",
         },
         {
            model: "simatic ipc547e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "r1.30.0",
         },
         {
            model: "simatic ipc647d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.01.14",
         },
         {
            model: "converged security management engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "11.0.0",
         },
         {
            model: "simatic ipc847d",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "19.01.14",
         },
         {
            model: "active management technology",
            scope: "eq",
            trust: 0.6,
            vendor: "intel",
            version: "11.2",
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc847d",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc827d",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc677d",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc647d",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc627d",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc547g",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc547e",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic fieldpg m5",
            scope: "eq",
            trust: 0.3,
            vendor: "siemens",
            version: "0",
         },
         {
            model: "simatic ipc847d",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v19.01.14",
         },
         {
            model: "simatic ipc827d",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v19.02.11",
         },
         {
            model: "simatic ipc677d",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v19.01.11",
         },
         {
            model: "simatic ipc647d",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v19.01.14",
         },
         {
            model: "simatic ipc627d",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v19.02.11",
         },
         {
            model: "simatic ipc547g r1.23.0",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc547e r1.30.0",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc477e",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v21.01.09",
         },
         {
            model: "simatic ipc427e",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v21.01.09",
         },
         {
            model: "simatic fieldpg m5",
            scope: "ne",
            trust: 0.3,
            vendor: "siemens",
            version: "v22.01.06",
         },
      ],
      sources: [
         {
            db: "BID",
            id: "106996",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-010878",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-608",
         },
         {
            db: "NVD",
            id: "CVE-2018-3616",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:intel:active_management_technology",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2018-010878",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The vendor reported this issue.,Siemens reported these vulnerabilities to NCCIC.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201809-608",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2018-3616",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "CVE-2018-3616",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 1.8,
                  vectorString: "AV:N/AC:M/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 4.3,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 8.6,
                  id: "VHN-133647",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:N/AC:M/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 5.9,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 2.2,
                  id: "CVE-2018-3616",
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               {
                  attackComplexity: "High",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5.9,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2018-3616",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2018-3616",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2018-3616",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201809-608",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-133647",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133647",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-010878",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-608",
         },
         {
            db: "NVD",
            id: "CVE-2018-3616",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network. Intel Active Management Technology Contains a cryptographic vulnerability.Information may be obtained. Multiple Siemens Products are prone to the following security vulnerabilities:\n1. Multiple stack-based buffer-overflow vulnerabilities\n2. A denial-of-service vulnerability\n3. A side channel attack information disclosure vulnerability\nAttackers can exploit these issues to execute arbitrary code within the context of an affected device or obtain sensitive information or cause a denial-of-service condition. \nThe following Siemens products are affected:\nSIMATIC FieldPG M5 All versions prior to 22.01.06,\nSIMATIC IPC427E All versions prior to 21.01.09,\nSIMATIC IPC477E All versions prior to 21.01.09,\nSIMATIC IPC547E All versions prior to R1.30.0,\nSIMATIC IPC547G All versions prior to R1.23.0,\nSIMATIC IPC627D All versions prior to 19.02.11,\nSIMATIC IPC647D All versions prior to 19.01.14,\nSIMATIC IPC677D All versions prior to 19.02.11,\nSIMATIC IPC827D All versions prior to 19.02.11,\nSIMATIC IPC847D All versions prior to 19.01.14, and\nSIMATIC ITP1000 All versions prior to 23.01.04. A security vulnerability exists in the TLS implementation in versions prior to Intel AMT 12.0.5",
      sources: [
         {
            db: "NVD",
            id: "CVE-2018-3616",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-010878",
         },
         {
            db: "BID",
            id: "106996",
         },
         {
            db: "VULHUB",
            id: "VHN-133647",
         },
      ],
      trust: 1.98,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2018-3616",
            trust: 2.8,
         },
         {
            db: "ICS CERT",
            id: "ICSA-19-043-05",
            trust: 2.8,
         },
         {
            db: "BID",
            id: "106996",
            trust: 2,
         },
         {
            db: "SIEMENS",
            id: "SSA-377318",
            trust: 1.7,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-010878",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-608",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2019.0444",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-133647",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133647",
         },
         {
            db: "BID",
            id: "106996",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-010878",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-608",
         },
         {
            db: "NVD",
            id: "CVE-2018-3616",
         },
      ],
   },
   id: "VAR-201809-1104",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133647",
         },
      ],
      trust: 0.6769231,
   },
   last_update_date: "2024-11-23T21:38:17.005000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INTEL-SA-00141",
            trust: 0.8,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
         },
         {
            title: "Intel Active Management Technology Security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=84867",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2018-010878",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-608",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
         {
            problemtype: "CWE-310",
            trust: 0.9,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133647",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-010878",
         },
         {
            db: "NVD",
            id: "CVE-2018-3616",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 3.4,
            url: "https://ics-cert.us-cert.gov/advisories/icsa-19-043-05",
         },
         {
            trust: 2.9,
            url: "http://www.securityfocus.com/bid/106996",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf",
         },
         {
            trust: 1.7,
            url: "https://security.netapp.com/advisory/ntap-20180924-0003/",
         },
         {
            trust: 1.7,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html",
         },
         {
            trust: 1.6,
            url: "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&docid=emr_na-hpesbhf03876en_us",
         },
         {
            trust: 0.8,
            url: "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3616",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2018-3616",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/75474",
         },
         {
            trust: 0.3,
            url: "http://subscriber.communications.siemens.com/",
         },
         {
            trust: 0.1,
            url: "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us&amp;docid=emr_na-hpesbhf03876en_us",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-133647",
         },
         {
            db: "BID",
            id: "106996",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-010878",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-608",
         },
         {
            db: "NVD",
            id: "CVE-2018-3616",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-133647",
         },
         {
            db: "BID",
            id: "106996",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2018-010878",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201809-608",
         },
         {
            db: "NVD",
            id: "CVE-2018-3616",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2018-09-12T00:00:00",
            db: "VULHUB",
            id: "VHN-133647",
         },
         {
            date: "2019-02-12T00:00:00",
            db: "BID",
            id: "106996",
         },
         {
            date: "2018-12-27T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2018-010878",
         },
         {
            date: "2018-09-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201809-608",
         },
         {
            date: "2018-09-12T19:29:02.403000",
            db: "NVD",
            id: "CVE-2018-3616",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2019-10-03T00:00:00",
            db: "VULHUB",
            id: "VHN-133647",
         },
         {
            date: "2019-02-12T00:00:00",
            db: "BID",
            id: "106996",
         },
         {
            date: "2019-02-13T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2018-010878",
         },
         {
            date: "2019-10-23T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201809-608",
         },
         {
            date: "2024-11-21T04:05:46.667000",
            db: "NVD",
            id: "CVE-2018-3616",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201809-608",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Intel Active Management Technology Cryptographic vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2018-010878",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "encryption problem",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201809-608",
         },
      ],
      trust: 0.6,
   },
}

cve-2024-56182
Vulnerability from cvelistv5
Published
2025-03-11 09:48
Modified
2025-03-11 14:05
Summary
A vulnerability has been identified in SIMATIC Field PG M5 (All versions), SIMATIC Field PG M6 (All versions < V26.01.12), SIMATIC IPC BX-21A (All versions < V31.01.07), SIMATIC IPC BX-32A (All versions < V29.01.07), SIMATIC IPC BX-39A (All versions < V29.01.07), SIMATIC IPC BX-59A (All versions < V32.01.04), SIMATIC IPC PX-32A (All versions < V29.01.07), SIMATIC IPC PX-39A (All versions < V29.01.07), SIMATIC IPC PX-39A PRO (All versions < V29.01.07), SIMATIC IPC RC-543B (All versions), SIMATIC IPC RW-543A (All versions), SIMATIC IPC127E (All versions), SIMATIC IPC227E (All versions), SIMATIC IPC227G (All versions), SIMATIC IPC277E (All versions), SIMATIC IPC277G (All versions), SIMATIC IPC277G PRO (All versions), SIMATIC IPC3000 SMART V3 (All versions), SIMATIC IPC327G (All versions), SIMATIC IPC347G (All versions), SIMATIC IPC377G (All versions), SIMATIC IPC427E (All versions), SIMATIC IPC477E (All versions), SIMATIC IPC477E PRO (All versions), SIMATIC IPC527G (All versions), SIMATIC IPC627E (All versions < V25.02.15), SIMATIC IPC647E (All versions < V25.02.15), SIMATIC IPC677E (All versions < V25.02.15), SIMATIC IPC847E (All versions < V25.02.15), SIMATIC ITP1000 (All versions). The affected devices have insufficient protection mechanism for the EFI(Extensible Firmware Interface) variables stored on the device. This could allow an authenticated attacker to disable the BIOS password without proper authorization by directly communicate with the flash controller.
Impacted products
Vendor Product Version
Siemens SIMATIC Field PG M5 Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC Field PG M6 Version: 0   < V26.01.12
Create a notification for this product.
   Siemens SIMATIC IPC BX-21A Version: 0   < V31.01.07
Create a notification for this product.
   Siemens SIMATIC IPC BX-32A Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC BX-39A Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC BX-59A Version: 0   < V32.01.04
Create a notification for this product.
   Siemens SIMATIC IPC PX-32A Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC PX-39A Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC PX-39A PRO Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC RC-543B Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC RW-543A Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC127E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC227E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC227G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC277E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC277G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC277G PRO Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC3000 SMART V3 Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC327G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC347G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC377G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC427E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC477E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC477E PRO Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC527G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC627E Version: 0   < V25.02.15
Create a notification for this product.
   Siemens SIMATIC IPC647E Version: 0   < V25.02.15
Create a notification for this product.
   Siemens SIMATIC IPC677E Version: 0   < V25.02.15
Create a notification for this product.
   Siemens SIMATIC IPC847E Version: 0   < V25.02.15
Create a notification for this product.
   Siemens SIMATIC ITP1000 Version: 0   < *
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-56182",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-11T14:03:47.493714Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-11T14:05:53.276Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "SIMATIC Field PG M5",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC Field PG M6",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V26.01.12",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC BX-21A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V31.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC BX-32A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC BX-39A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC BX-59A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V32.01.04",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC PX-32A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC PX-39A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC PX-39A PRO",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC RC-543B",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC RW-543A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC127E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC227E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC227G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC277E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC277G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC277G PRO",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC3000 SMART V3",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC327G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC347G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC377G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC427E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC477E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC477E PRO",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC527G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC627E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V25.02.15",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC647E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V25.02.15",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC677E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V25.02.15",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC847E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V25.02.15",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC ITP1000",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in SIMATIC Field PG M5 (All versions), SIMATIC Field PG M6 (All versions < V26.01.12), SIMATIC IPC BX-21A (All versions < V31.01.07), SIMATIC IPC BX-32A (All versions < V29.01.07), SIMATIC IPC BX-39A (All versions < V29.01.07), SIMATIC IPC BX-59A (All versions < V32.01.04), SIMATIC IPC PX-32A (All versions < V29.01.07), SIMATIC IPC PX-39A (All versions < V29.01.07), SIMATIC IPC PX-39A PRO (All versions < V29.01.07), SIMATIC IPC RC-543B (All versions), SIMATIC IPC RW-543A (All versions), SIMATIC IPC127E (All versions), SIMATIC IPC227E (All versions), SIMATIC IPC227G (All versions), SIMATIC IPC277E (All versions), SIMATIC IPC277G (All versions), SIMATIC IPC277G PRO (All versions), SIMATIC IPC3000 SMART V3 (All versions), SIMATIC IPC327G (All versions), SIMATIC IPC347G (All versions), SIMATIC IPC377G (All versions), SIMATIC IPC427E (All versions), SIMATIC IPC477E (All versions), SIMATIC IPC477E PRO (All versions), SIMATIC IPC527G (All versions), SIMATIC IPC627E (All versions < V25.02.15), SIMATIC IPC647E (All versions < V25.02.15), SIMATIC IPC677E (All versions < V25.02.15), SIMATIC IPC847E (All versions < V25.02.15), SIMATIC ITP1000 (All versions). The affected devices have insufficient protection mechanism for the EFI(Extensible Firmware Interface) variables stored on the device. This could allow an authenticated attacker to disable the BIOS password without proper authorization by directly communicate with the flash controller.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.2,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
            },
            {
               cvssV4_0: {
                  baseScore: 8.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H",
                  version: "4.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-693",
                     description: "CWE-693: Protection Mechanism Failure",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-11T09:48:05.319Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/html/ssa-216014.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2024-56182",
      datePublished: "2025-03-11T09:48:05.319Z",
      dateReserved: "2024-12-18T12:06:43.292Z",
      dateUpdated: "2025-03-11T14:05:53.276Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-56181
Vulnerability from cvelistv5
Published
2025-03-11 09:48
Modified
2025-03-11 14:06
Summary
A vulnerability has been identified in SIMATIC Field PG M5 (All versions), SIMATIC IPC BX-21A (All versions < V31.01.07), SIMATIC IPC BX-32A (All versions < V29.01.07), SIMATIC IPC BX-39A (All versions < V29.01.07), SIMATIC IPC BX-59A (All versions < V32.01.04), SIMATIC IPC PX-32A (All versions < V29.01.07), SIMATIC IPC PX-39A (All versions < V29.01.07), SIMATIC IPC PX-39A PRO (All versions < V29.01.07), SIMATIC IPC RC-543B (All versions), SIMATIC IPC RW-543A (All versions), SIMATIC IPC127E (All versions), SIMATIC IPC227E (All versions), SIMATIC IPC227G (All versions), SIMATIC IPC277E (All versions), SIMATIC IPC277G (All versions), SIMATIC IPC277G PRO (All versions), SIMATIC IPC3000 SMART V3 (All versions), SIMATIC IPC327G (All versions), SIMATIC IPC347G (All versions), SIMATIC IPC377G (All versions), SIMATIC IPC427E (All versions), SIMATIC IPC477E (All versions), SIMATIC IPC477E PRO (All versions), SIMATIC IPC527G (All versions), SIMATIC IPC627E (All versions < V25.02.15), SIMATIC IPC647E (All versions < V25.02.15), SIMATIC IPC677E (All versions < V25.02.15), SIMATIC IPC847E (All versions < V25.02.15), SIMATIC ITP1000 (All versions). The affected devices have insufficient protection mechanism for the EFI(Extensible Firmware Interface) variables stored on the device. This could allow an authenticated attacker to alter the secure boot configuration without proper authorization by directly communicate with the flash controller.
Impacted products
Vendor Product Version
Siemens SIMATIC Field PG M5 Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC BX-21A Version: 0   < V31.01.07
Create a notification for this product.
   Siemens SIMATIC IPC BX-32A Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC BX-39A Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC BX-59A Version: 0   < V32.01.04
Create a notification for this product.
   Siemens SIMATIC IPC PX-32A Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC PX-39A Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC PX-39A PRO Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC RC-543B Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC RW-543A Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC127E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC227E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC227G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC277E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC277G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC277G PRO Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC3000 SMART V3 Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC327G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC347G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC377G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC427E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC477E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC477E PRO Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC527G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC627E Version: 0   < V25.02.15
Create a notification for this product.
   Siemens SIMATIC IPC647E Version: 0   < V25.02.15
Create a notification for this product.
   Siemens SIMATIC IPC677E Version: 0   < V25.02.15
Create a notification for this product.
   Siemens SIMATIC IPC847E Version: 0   < V25.02.15
Create a notification for this product.
   Siemens SIMATIC ITP1000 Version: 0   < *
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-56181",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-11T14:06:38.581942Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-11T14:06:50.557Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "SIMATIC Field PG M5",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC BX-21A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V31.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC BX-32A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC BX-39A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC BX-59A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V32.01.04",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC PX-32A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC PX-39A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC PX-39A PRO",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC RC-543B",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC RW-543A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC127E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC227E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC227G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC277E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC277G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC277G PRO",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC3000 SMART V3",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC327G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC347G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC377G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC427E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC477E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC477E PRO",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC527G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC627E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V25.02.15",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC647E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V25.02.15",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC677E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V25.02.15",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC847E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V25.02.15",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC ITP1000",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in SIMATIC Field PG M5 (All versions), SIMATIC IPC BX-21A (All versions < V31.01.07), SIMATIC IPC BX-32A (All versions < V29.01.07), SIMATIC IPC BX-39A (All versions < V29.01.07), SIMATIC IPC BX-59A (All versions < V32.01.04), SIMATIC IPC PX-32A (All versions < V29.01.07), SIMATIC IPC PX-39A (All versions < V29.01.07), SIMATIC IPC PX-39A PRO (All versions < V29.01.07), SIMATIC IPC RC-543B (All versions), SIMATIC IPC RW-543A (All versions), SIMATIC IPC127E (All versions), SIMATIC IPC227E (All versions), SIMATIC IPC227G (All versions), SIMATIC IPC277E (All versions), SIMATIC IPC277G (All versions), SIMATIC IPC277G PRO (All versions), SIMATIC IPC3000 SMART V3 (All versions), SIMATIC IPC327G (All versions), SIMATIC IPC347G (All versions), SIMATIC IPC377G (All versions), SIMATIC IPC427E (All versions), SIMATIC IPC477E (All versions), SIMATIC IPC477E PRO (All versions), SIMATIC IPC527G (All versions), SIMATIC IPC627E (All versions < V25.02.15), SIMATIC IPC647E (All versions < V25.02.15), SIMATIC IPC677E (All versions < V25.02.15), SIMATIC IPC847E (All versions < V25.02.15), SIMATIC ITP1000 (All versions). The affected devices have insufficient protection mechanism for the EFI(Extensible Firmware Interface) variables stored on the device. This could allow an authenticated attacker to alter the secure boot configuration without proper authorization by directly communicate with the flash controller.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.2,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
            },
            {
               cvssV4_0: {
                  baseScore: 8.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H",
                  version: "4.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-693",
                     description: "CWE-693: Protection Mechanism Failure",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-11T09:48:03.703Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/html/ssa-216014.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2024-56181",
      datePublished: "2025-03-11T09:48:03.703Z",
      dateReserved: "2024-12-18T12:06:43.292Z",
      dateUpdated: "2025-03-11T14:06:50.557Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}