Vulnerabilites related to Siemens - SIMATIC IPC627E
var-202202-0007
Vulnerability from variot

A vulnerability exists in System Management Interrupt (SWSMI) handler of InsydeH2O UEFI Firmware code located in SWSMI handler that dereferences gRT (EFI_RUNTIME_SERVICES) pointer to call a GetVariable service, which is located outside of SMRAM. This can result in code execution in SMM (escalating privilege from ring 0 to ring -2). The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count

SMM Privilege Escalation 10

SMM Memory Corruption 12

DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. InsydeH2O UEFI There is an unspecified vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0007",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc377g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc647e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 1,
            vendor: "insyde",
            version: "5.34.03.0029",
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 1,
            vendor: "insyde",
            version: "5.33.15.0034",
         },
         {
            model: "simatic ipc627e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc847e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc677e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc227g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 1,
            vendor: "insyde",
            version: "5.23.04.0045",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc327g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "ruggedcom ape1808",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc127e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 1,
            vendor: "insyde",
            version: "5.42.03.0010",
         },
         {
            model: "simatic ipc277g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc477e pro",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 1,
            vendor: "insyde",
            version: "5.23.45.0023",
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 1,
            vendor: "insyde",
            version: "5.12.09.0074",
         },
         {
            model: "insydeh2o",
            scope: null,
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
         {
            db: "NVD",
            id: "CVE-2020-5953",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:5.12.09.0074:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:5.23.04.0045:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:5.23.45.0023:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:5.33.15.0034:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:5.34.03.0029:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:5.42.03.0010:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:ruggedcom_ape1808_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:ruggedcom_ape1808:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc127e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc227g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc277g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc327g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc377g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-5953",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This document was written by Vijay Sarvepalli.Statement Date:   March 01, 2022",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2020-5953",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 6.9,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.4,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:M/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 6.9,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2020-5953",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:M/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.8,
                  impactScore: 6,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "High",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-5953",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Changed",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-5953",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202202-121",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
         {
            db: "NVD",
            id: "CVE-2020-5953",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-121",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability exists in System Management Interrupt (SWSMI) handler of InsydeH2O UEFI Firmware code located in SWSMI handler that dereferences gRT (EFI_RUNTIME_SERVICES) pointer to call a GetVariable service, which is located outside of SMRAM. This can result in code execution in SMM (escalating privilege from ring 0 to ring -2). The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count \n\n\n\n\nSMM Privilege Escalation 10 \n\n\n SMM Memory Corruption  12 \n\n\n DXE Memory Corruption 1CVE-2020-27339 Affected\nCVE-2020-5953 Affected\nCVE-2021-33625 Affected\nCVE-2021-33626 Affected\nCVE-2021-33627 Affected\nCVE-2021-41837 Affected\nCVE-2021-41838 Affected\nCVE-2021-41839 Affected\nCVE-2021-41840 Affected\nCVE-2021-41841 Affected\nCVE-2021-42059 Affected\nCVE-2021-42060 Not Affected\nCVE-2021-42113 Affected\nCVE-2021-42554 Affected\nCVE-2021-43323 Affected\nCVE-2021-43522 Affected\nCVE-2021-43615 Not Affected\nCVE-2021-45969 Not Affected\nCVE-2021-45970 Not Affected\nCVE-2021-45971 Not Affected\nCVE-2022-24030 Not Affected\nCVE-2022-24031 Not Affected\nCVE-2022-24069 Not Affected\nCVE-2022-28806 Unknown. InsydeH2O UEFI There is an unspecified vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-5953",
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-5953",
            trust: 4,
         },
         {
            db: "SIEMENS",
            id: "SSA-306654",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97136454",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001342",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2022020305",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-73436",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-121",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
         {
            db: "NVD",
            id: "CVE-2020-5953",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-121",
         },
      ],
   },
   id: "VAR-202202-0007",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2023-12-18T10:51:42.667000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INSYDE-SA-2022017",
            trust: 0.8,
            url: "https://www.insyde.com/products",
         },
         {
            title: "Insyde InsydeH2O Security vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=180215",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-121",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
         {
            problemtype: "Lack of information (CWE-noinfo) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
         {
            db: "NVD",
            id: "CVE-2020-5953",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
         },
         {
            trust: 1.6,
            url: "https://security.netapp.com/advisory/ntap-20220222-0005/",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/products",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-5953",
         },
         {
            trust: 0.8,
            url: "cve-2020-27339  ",
         },
         {
            trust: 0.8,
            url: "cve-2020-5953  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33625  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33626  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33627  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41837  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41838  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41839  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41840  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41841  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42059  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42060  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42113  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42554  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43323  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43522  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43615  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45969  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45970  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45971  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24030  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24031  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24069  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-28806  ",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu97136454/index.html",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/independent-bios-developers-multiple-vulnerabilities-via-uefi-37438",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-73436",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022020305",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
         {
            db: "NVD",
            id: "CVE-2020-5953",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-121",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
         {
            db: "NVD",
            id: "CVE-2020-5953",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-121",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-01T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
         {
            date: "2022-02-03T01:15:07.647000",
            db: "NVD",
            id: "CVE-2020-5953",
         },
         {
            date: "2022-02-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-121",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-28T07:09:00",
            db: "JVNDB",
            id: "JVNDB-2022-001342",
         },
         {
            date: "2022-04-12T18:17:18.710000",
            db: "NVD",
            id: "CVE-2020-5953",
         },
         {
            date: "2022-03-10T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-121",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-121",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-121",
         },
      ],
      trust: 0.6,
   },
}

var-202106-0128
Vulnerability from variot

Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. plural Intel(R) Processor There is an initialization vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0128",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "solidfire bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "hci storage node bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "fas bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc677e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "cloud backup",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "simatic ipc477e pro",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc847e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc647e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "e-series bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "bios",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "aff bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "simatic ipc547g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic cpu 1518-4",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc627e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "hci compute node bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "bios",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: null,
         },
         {
            model: "bios",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "bios  firmware",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008107",
         },
         {
            db: "NVD",
            id: "CVE-2020-12357",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:bios:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6498du:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1524n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1563n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1573n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1581:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1587:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1612:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1632:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2104g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1205_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1428l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1603_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1603_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1607_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1607_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1620_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1630_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1650_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1660_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1680_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2408l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2418l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2428l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2438l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2603_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2608l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2609_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2618l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2620_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2623_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2628l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2630_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2630l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2637_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2640_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2643_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2648l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2650_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2650l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2658_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2658a_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2660_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2667_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2670_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2679_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2680_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2683_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2685_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2687w_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2689_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2690_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2695_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2697_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2698_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2699_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2699r_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4610_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4620_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4627_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4640_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4648_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4650_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4655_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4660_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4667_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4669_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8855_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5117:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5117f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5219y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6122:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6129:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6134m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6135:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6137:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6142m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6143:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6162:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6222:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6262:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6269y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8165:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8170m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8174:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8176m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8180m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4106h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4123:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2102:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2104:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6498du:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1524n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1563n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1573n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1581:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1587:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1612:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1632:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2104g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1205_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1428l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1603_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1603_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1607_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1607_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1620_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1630_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1650_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1660_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1680_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2408l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2418l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2428l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2438l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2603_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2608l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2609_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2618l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2620_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2623_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2628l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2630_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2630l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2637_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2640_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2643_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2648l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2650_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2650l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2658_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2658a_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2660_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2667_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2670_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2679_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2680_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2683_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2685_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2687w_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2689_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2690_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2695_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2697_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2698_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2699_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2699r_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4610_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4620_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4627_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4640_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4648_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4650_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4655_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4660_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4667_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4669_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8855_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5117:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5117f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5219y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6122:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6129:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6134m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6135:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6137:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6142m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6143:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6162:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6222:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6262:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6269y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8165:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8170m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8174:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8176m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8180m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4106h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4123:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2102:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2104:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:aff_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:e-series_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:fas_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_cpu_1518-4_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_cpu_1518-4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_cpu_1518-4_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_cpu_1518-4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-12357",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens reported these vulnerabilities to CISA.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-640",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2020-12357",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.6,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "CVE-2020-12357",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "MEDIUM",
                  trust: 1.9,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.8,
                  id: "CVE-2020-12357",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 6.7,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-12357",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-12357",
                  trust: 1.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202106-640",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-12357",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-12357",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008107",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-640",
         },
         {
            db: "NVD",
            id: "CVE-2020-12357",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. plural  Intel(R) Processor There is an initialization vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-12357",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008107",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2020-12357",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-12357",
            trust: 3.3,
         },
         {
            db: "SIEMENS",
            id: "SSA-309571",
            trust: 1.7,
         },
         {
            db: "JVN",
            id: "JVNVU99965981",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008107",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.2818",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.1995",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-62742",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021061616",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021081109",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-222-05",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-640",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2020-12357",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-12357",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008107",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-640",
         },
         {
            db: "NVD",
            id: "CVE-2020-12357",
         },
      ],
   },
   id: "VAR-202106-0128",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5185185333333333,
   },
   last_update_date: "2022-05-04T07:37:47.598000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INTEL-SA-00463",
            trust: 0.8,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=240e27e5c8fba28153598a375a2a4130",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-12357",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008107",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-665",
            trust: 1,
         },
         {
            problemtype: "Improper initialization (CWE-665) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008107",
         },
         {
            db: "NVD",
            id: "CVE-2020-12357",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html",
         },
         {
            trust: 1.7,
            url: "https://security.netapp.com/advisory/ntap-20210702-0002/",
         },
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu99965981/",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-12357",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021081109",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/intel-processor-multiple-vulnerabilities-via-bios-firmware-35669",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.2818",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-62742",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.1995",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021061616",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-222-05",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/665.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://cert-portal.siemens.com/productcert/txt/ssa-309571.txt",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-12357",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008107",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-640",
         },
         {
            db: "NVD",
            id: "CVE-2020-12357",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2020-12357",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008107",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-640",
         },
         {
            db: "NVD",
            id: "CVE-2020-12357",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-06-09T00:00:00",
            db: "VULMON",
            id: "CVE-2020-12357",
         },
         {
            date: "2022-03-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-008107",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-06-08T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-640",
         },
         {
            date: "2021-06-09T19:15:00",
            db: "NVD",
            id: "CVE-2020-12357",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-08-10T00:00:00",
            db: "VULMON",
            id: "CVE-2020-12357",
         },
         {
            date: "2022-03-04T06:25:00",
            db: "JVNDB",
            id: "JVNDB-2021-008107",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2022-04-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-640",
         },
         {
            date: "2022-04-22T16:19:00",
            db: "NVD",
            id: "CVE-2020-12357",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-640",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Intel(R) Processor  Firmware initialization vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008107",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-640",
         },
      ],
      trust: 1.2,
   },
}

var-202011-1361
Vulnerability from variot

Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel(R) There are unspecified vulnerabilities in processor products.Information may be obtained. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

===================================================================== Red Hat Security Advisory

Synopsis: Moderate: microcode_ctl security, bug fix and enhancement update Advisory ID: RHSA-2020:5183-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:5183 Issue date: 2020-11-23 CVE Names: CVE-2020-8695 CVE-2020-8696 CVE-2020-8698 =====================================================================

  1. Summary:

An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Server AUS (v. 7.3) - x86_64 Red Hat Enterprise Linux Server E4S (v. 7.3) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.3) - x86_64

  1. Description:

The microcode_ctl packages provide microcode updates for Intel.

Security Fix(es):

  • hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)

  • hw: Vector Register Leakage-Active (CVE-2020-8696)

  • hw: Fast forward store predictor (CVE-2020-8698)

Bug Fix(es) and Enhancement(s):

  • Update Intel CPU microcode to microcode-20201112 release, addresses:
  • Addition of 06-55-0b/0xbf (CPX-SP A1) microcode at revision 0x700001e;
  • Addition of 06-8a-01/0x10 (LKF B2/B3) microcode at revision 0x28;
  • Addition of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode at revision 0x68;
  • Addition of 06-a5-02/0x20 (CML-H R1) microcode at revision 0xe0;
  • Addition of 06-a5-03/0x22 (CML-S 6+2 G1) microcode at revision 0xe0;
  • Addition of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode at revision 0xe0;
  • Addition of 06-a6-01/0x80 (CML-U 6+2 v2 K0) microcode at revision 0xe0;
  • Update of 06-4e-03/0xc0 (SKL-U/U 2+3e/Y D0/K1) microcode (in intel-06-4e-03/intel-ucode/06-4e-03) from revision 0xdc up to 0xe2;
  • Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006906 up to 0x2006a08;
  • Update of 06-5e-03/0x36 (SKL-H/S/Xeon E3 N0/R0/S0) microcode (in intel-06-5e-03/intel-ucode/06-5e-03) from revision 0xdc up to 0xe2;
  • Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up to 0xde;
  • Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up to 0xde;
  • Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xd6 up to 0xe0;
  • Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xd6 up to 0xde;
  • Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from revision 0xd6 up to 0xde;
  • Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xd6 up to 0xde;
  • Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xd6 up to 0xde;
  • Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xd6 up to 0xde;
  • Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xd6 up to 0xde;
  • Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xd6 up to 0xde;
  • Update of 06-3f-02/0x6f (HSX-E/EN/EP/EP 4S C0/C1/M1/R2) microcode from revision 0x43 up to 0x44;
  • Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000157 up to 0x1000159;
  • Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4002f01 up to 0x4003003;
  • Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision 0x5002f01 up to 0x5003003;
  • Update of 06-5c-09/0x03 (APL D0) microcode from revision 0x38 up to 0x40;
  • Update of 06-5c-0a/0x03 (APL B1/F1) microcode from revision 0x16 up to 0x1e;
  • Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x32 up to 0x34;
  • Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x16 up to 0x18;
  • Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x78 up to 0xa0;
  • Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xca up to 0xe0.

  • Disable 06-8c-01 (TGL-UP3/UP4 B1) microcode update by default.

  • Add README file to the documentation directory.

  • Add publicly-sourced codenames list to supply to gen_provides.sh; update the latter to handle the somewhat different format.

  • Add SUMMARY.intel-ucode file

  • Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1828583 - CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface 1890355 - CVE-2020-8696 hw: Vector Register Leakage-Active 1890356 - CVE-2020-8698 hw: Fast forward store predictor

  1. Package List:

Red Hat Enterprise Linux Server AUS (v. 7.3):

Source: microcode_ctl-2.1-16.37.el7_3.src.rpm

x86_64: microcode_ctl-2.1-16.37.el7_3.x86_64.rpm microcode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm

Red Hat Enterprise Linux Server E4S (v. 7.3):

Source: microcode_ctl-2.1-16.37.el7_3.src.rpm

x86_64: microcode_ctl-2.1-16.37.el7_3.x86_64.rpm microcode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm

Red Hat Enterprise Linux Server TUS (v. 7.3):

Source: microcode_ctl-2.1-16.37.el7_3.src.rpm

x86_64: microcode_ctl-2.1-16.37.el7_3.x86_64.rpm microcode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2020-8695 https://access.redhat.com/security/cve/CVE-2020-8696 https://access.redhat.com/security/cve/CVE-2020-8698 https://access.redhat.com/security/updates/classification/#moderate

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBX7v1LtzjgjWX9erEAQhhzBAAi0jG7U8W+Dm2A/Nq40aoLyRcGknttkV1 0wwy62OR4KUnqiP0gHB8Sjh6UpAPqhLNExc2+B8RyUB23yUe8/PRB1fUqpmf5150 mzwiORZfu572ao7GLskdc4SUydVSqY9QuTK7mTm+HGmOm2XQpics51xWjyfKM/TN 5lrrd3DXxTrXwsjva2tPJcCp9A1s3XAVjK16Fu+FcKvXsgxruUy41YxJMsY8Mxfj pPRzcXdMvPQYhvyv8y1KY2Mz5WMKdpOK83X6Y9iYL6d0g2UT1d3cw8AOHc6GYNFS MhLDUASoII2A4xWkXCOyaocrg58QFctEHGfnxwTU5ZGq/vfOduUSLE881thD+tqD qgQBaz0cp0tNr+nYXvhtyX9XE4ve/lszq5BxqnNF0xi9hP8T5DwZzXnhtZ+aZML2 3WlT3tqgkDE7hZqyqSG8Vd9ZLzVkjmnw7+tqRjIGvzN9eKQxLXg/fPkKeHGh+HOz y0zCBHlZKrKtz0lQHP48W9t6l0Rkh19hW1fIA46rW4C7erDcW78nBMJ2cTAxbBk1 ITTGOIHpUgn3882xKM/yAHUMK25Xkh2va/e8UpafYEazSM4H9T15N87UyCVneKdD s2N1tYHegx85eoOlt24Bw2RBPFHhFGWOtE0McQ09kyDKFyGJXUMqzPhBUvvJz8mE G3KPuKrDU0U= =Vap7 -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================== Ubuntu Security Notice USN-4628-2 November 12, 2020

intel-microcode regression

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 20.10
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 ESM

Summary:

USN-4628-1 introduced a regression in the Intel Microcode for some processors. Unfortunately, that update prevented certain processors in the Intel Tiger Lake family from booting successfully. This update reverts the microcode update for the Tiger Lake processor family.

Please note that the 'dis_ucode_ldr' kernel command line option can be added in the boot menu to disable microcode loading for system recovery.

We apologize for the inconvenience.

Original advisory details:

Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine Easdon, Claudio Canella, and Daniel Gruss discovered that the Intel Running Average Power Limit (RAPL) feature of some Intel processors allowed a side- channel attack based on power consumption measurements. A local attacker could possibly use this to expose sensitive information. (CVE-2020-8695)

Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that some Intel(R) Processors did not properly remove sensitive information before storage or transfer in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2020-8696)

Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that some Intel(R) Processors did not properly isolate shared resources in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2020-8698)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 20.10: intel-microcode 3.20201110.0ubuntu0.20.10.2

Ubuntu 20.04 LTS: intel-microcode 3.20201110.0ubuntu0.20.04.2

Ubuntu 18.04 LTS: intel-microcode 3.20201110.0ubuntu0.18.04.2

Ubuntu 16.04 LTS: intel-microcode 3.20201110.0ubuntu0.16.04.2

Ubuntu 14.04 ESM: intel-microcode 3.20201110.0ubuntu0.14.04.2

After a standard system update you need to reboot your computer to make all the necessary changes

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1361",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic ipc477e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.15",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1,
            vendor: "debian",
            version: "9.0",
         },
         {
            model: "hci storage node bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "clustered data ontap",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "simatic ipc647e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "simatic itp1000",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "23.01.08",
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "31",
         },
         {
            model: "simatic field pg m5",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "22.01.08",
         },
         {
            model: "hci compute node bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "simatic ipc847e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "simatic ipc477e pro",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.15",
         },
         {
            model: "simatic ipc677e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "simatic ipc427e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.15",
         },
         {
            model: "solidfire bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "simatic ipc627e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "microcode",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "hci compute node bios",
            scope: null,
            trust: 0.8,
            vendor: "netapp",
            version: null,
         },
         {
            model: "fedora",
            scope: null,
            trust: 0.8,
            vendor: "fedora",
            version: null,
         },
         {
            model: "solidfire bios",
            scope: null,
            trust: 0.8,
            vendor: "netapp",
            version: null,
         },
         {
            model: "gnu/linux",
            scope: null,
            trust: 0.8,
            vendor: "debian",
            version: null,
         },
         {
            model: "clustered data ontap",
            scope: null,
            trust: 0.8,
            vendor: "netapp",
            version: null,
         },
         {
            model: "microcode",
            scope: null,
            trust: 0.8,
            vendor: "インテル",
            version: null,
         },
         {
            model: "hci storage node bios",
            scope: null,
            trust: 0.8,
            vendor: "netapp",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            db: "NVD",
            id: "CVE-2020-8698",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:microcode:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:microcode:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:netapp:solidfire:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:netapp:solidfire:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "22.01.08",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "22.01.08",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "21.01.15",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "21.01.15",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "21.01.15",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "21.01.15",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "21.01.15",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "21.01.15",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.08",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.08",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.08",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.08",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.08",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.08",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.08",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.08",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "23.01.08",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "23.01.08",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-8698",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Ubuntu",
      sources: [
         {
            db: "PACKETSTORM",
            id: "160018",
         },
         {
            db: "PACKETSTORM",
            id: "160035",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2020-8698",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 2.1,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "CVE-2020-8698",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "LOW",
                  trust: 1.9,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2020-8698",
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 5.5,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-8698",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "Low",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-8698",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201911-1657",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-8698",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8698",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
         {
            db: "NVD",
            id: "CVE-2020-8698",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel(R) There are unspecified vulnerabilities in processor products.Information may be obtained. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n                   Red Hat Security Advisory\n\nSynopsis:          Moderate: microcode_ctl security, bug fix and enhancement update\nAdvisory ID:       RHSA-2020:5183-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2020:5183\nIssue date:        2020-11-23\nCVE Names:         CVE-2020-8695 CVE-2020-8696 CVE-2020-8698 \n=====================================================================\n\n1. Summary:\n\nAn update for microcode_ctl is now available for Red Hat Enterprise Linux\n7.3 Advanced Update Support. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Server AUS (v. 7.3) - x86_64\nRed Hat Enterprise Linux Server E4S (v. 7.3) - x86_64\nRed Hat Enterprise Linux Server TUS (v. 7.3) - x86_64\n\n3. Description:\n\nThe microcode_ctl packages provide microcode updates for Intel. \n\nSecurity Fix(es):\n\n* hw: Information disclosure issue in Intel SGX via RAPL interface\n(CVE-2020-8695)\n\n* hw: Vector Register Leakage-Active (CVE-2020-8696)\n\n* hw: Fast forward store predictor (CVE-2020-8698)\n\nBug Fix(es) and Enhancement(s):\n\n* Update Intel CPU microcode to microcode-20201112 release, addresses:\n  - Addition of 06-55-0b/0xbf (CPX-SP A1) microcode at revision 0x700001e;\n  - Addition of 06-8a-01/0x10 (LKF B2/B3) microcode at revision 0x28;\n  - Addition of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode at revision 0x68;\n  - Addition of 06-a5-02/0x20 (CML-H R1) microcode at revision 0xe0;\n  - Addition of 06-a5-03/0x22 (CML-S 6+2 G1) microcode at revision 0xe0;\n  - Addition of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode at revision 0xe0;\n  - Addition of 06-a6-01/0x80 (CML-U 6+2 v2 K0) microcode at revision\n    0xe0;\n  - Update of 06-4e-03/0xc0 (SKL-U/U 2+3e/Y D0/K1) microcode (in\n    intel-06-4e-03/intel-ucode/06-4e-03) from revision 0xdc up to 0xe2;\n  - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in\n    intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006906 up\n    to 0x2006a08;\n  - Update of 06-5e-03/0x36 (SKL-H/S/Xeon E3 N0/R0/S0) microcode (in\n    intel-06-5e-03/intel-ucode/06-5e-03) from revision 0xdc up to 0xe2;\n  - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xd6 up\n    to 0xe0;\n  - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0)\n    microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from\n    revision 0xd6 up to 0xde;\n  - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in\n    intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xd6 up\n    to 0xde;\n  - Update of 06-3f-02/0x6f (HSX-E/EN/EP/EP 4S C0/C1/M1/R2) microcode\n    from revision 0x43 up to 0x44;\n  - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000157\n    up to 0x1000159;\n  - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4002f01\n    up to 0x4003003;\n  - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision\n    0x5002f01 up to 0x5003003;\n  - Update of 06-5c-09/0x03 (APL D0) microcode from revision 0x38 up\n    to 0x40;\n  - Update of 06-5c-0a/0x03 (APL B1/F1) microcode from revision 0x16 up\n    to 0x1e;\n  - Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x32 up\n    to 0x34;\n  - Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x16 up\n    to 0x18;\n  - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x78\n    up to 0xa0;\n  - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xca\n    up to 0xe0. \n\n* Disable 06-8c-01 (TGL-UP3/UP4 B1) microcode update by default. \n\n* Add README file to the documentation directory. \n\n* Add publicly-sourced codenames list to supply to gen_provides.sh; update\n  the latter to handle the somewhat different format. \n\n* Add SUMMARY.intel-ucode file\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1828583 - CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface\n1890355 - CVE-2020-8696 hw: Vector Register Leakage-Active\n1890356 - CVE-2020-8698 hw: Fast forward store predictor\n\n6. Package List:\n\nRed Hat Enterprise Linux Server AUS (v. 7.3):\n\nSource:\nmicrocode_ctl-2.1-16.37.el7_3.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-16.37.el7_3.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm\n\nRed Hat Enterprise Linux Server E4S (v. 7.3):\n\nSource:\nmicrocode_ctl-2.1-16.37.el7_3.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-16.37.el7_3.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm\n\nRed Hat Enterprise Linux Server TUS (v. 7.3):\n\nSource:\nmicrocode_ctl-2.1-16.37.el7_3.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-16.37.el7_3.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-8695\nhttps://access.redhat.com/security/cve/CVE-2020-8696\nhttps://access.redhat.com/security/cve/CVE-2020-8698\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2020 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nG3KPuKrDU0U=\n=Vap7\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. ==========================================================================\nUbuntu Security Notice USN-4628-2\nNovember 12, 2020\n\nintel-microcode regression\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 20.10\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 ESM\n\nSummary:\n\nUSN-4628-1 introduced a regression in the Intel Microcode for some processors. Unfortunately,\nthat update prevented certain processors in the Intel Tiger Lake family\nfrom booting successfully. This update reverts the microcode update for\nthe Tiger Lake processor family. \n\nPlease note that the 'dis_ucode_ldr' kernel command line option can be\nadded in the boot menu to disable microcode loading for system recovery. \n\nWe apologize for the inconvenience. \n\nOriginal advisory details:\n\n Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine\n Easdon, Claudio Canella, and Daniel Gruss discovered that the Intel Running\n Average Power Limit (RAPL) feature of some Intel processors allowed a side-\n channel attack based on power consumption measurements. A local attacker\n could possibly use this to expose sensitive information. (CVE-2020-8695)\n \n Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that\n some Intel(R) Processors did not properly remove sensitive information\n before storage or transfer in some situations. A local attacker could\n possibly use this to expose sensitive information. (CVE-2020-8696)\n \n Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that\n some Intel(R) Processors did not properly isolate shared resources in some\n situations. A local attacker could possibly use this to expose sensitive\n information. (CVE-2020-8698)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 20.10:\n  intel-microcode                 3.20201110.0ubuntu0.20.10.2\n\nUbuntu 20.04 LTS:\n  intel-microcode                 3.20201110.0ubuntu0.20.04.2\n\nUbuntu 18.04 LTS:\n  intel-microcode                 3.20201110.0ubuntu0.18.04.2\n\nUbuntu 16.04 LTS:\n  intel-microcode                 3.20201110.0ubuntu0.16.04.2\n\nUbuntu 14.04 ESM:\n  intel-microcode                 3.20201110.0ubuntu0.14.04.2\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-8698",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8698",
         },
         {
            db: "PACKETSTORM",
            id: "163924",
         },
         {
            db: "PACKETSTORM",
            id: "163954",
         },
         {
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            db: "PACKETSTORM",
            id: "160191",
         },
         {
            db: "PACKETSTORM",
            id: "160018",
         },
         {
            db: "PACKETSTORM",
            id: "160188",
         },
         {
            db: "PACKETSTORM",
            id: "160035",
         },
      ],
      trust: 2.43,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-8698",
            trust: 3.3,
         },
         {
            db: "SIEMENS",
            id: "SSA-678983",
            trust: 1.7,
         },
         {
            db: "JVN",
            id: "JVNVU91051134",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
            trust: 0.8,
         },
         {
            db: "ICS CERT",
            id: "ICSA-22-132-05",
            trust: 0.7,
         },
         {
            db: "PACKETSTORM",
            id: "163772",
            trust: 0.7,
         },
         {
            db: "PACKETSTORM",
            id: "160018",
            trust: 0.7,
         },
         {
            db: "PACKETSTORM",
            id: "160035",
            trust: 0.7,
         },
         {
            db: "PACKETSTORM",
            id: "163993",
            trust: 0.6,
         },
         {
            db: "PACKETSTORM",
            id: "163863",
            trust: 0.6,
         },
         {
            db: "PACKETSTORM",
            id: "162588",
            trust: 0.6,
         },
         {
            db: "PACKETSTORM",
            id: "160187",
            trust: 0.6,
         },
         {
            db: "PACKETSTORM",
            id: "163757",
            trust: 0.6,
         },
         {
            db: "PACKETSTORM",
            id: "160407",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.2604",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.2905",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.4124",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.4327",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.2797",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.0423",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.2721",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.4017",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2022.2355",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.4200",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.1664",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.2945",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.3959",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.4153",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.4033",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.2672",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021083127",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021081125",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021080915",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021081834",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-49266",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1657",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2020-8698",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "163924",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "163954",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "163758",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "160191",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "160188",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8698",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            db: "PACKETSTORM",
            id: "163924",
         },
         {
            db: "PACKETSTORM",
            id: "163954",
         },
         {
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            db: "PACKETSTORM",
            id: "160191",
         },
         {
            db: "PACKETSTORM",
            id: "160018",
         },
         {
            db: "PACKETSTORM",
            id: "160188",
         },
         {
            db: "PACKETSTORM",
            id: "160035",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
         {
            db: "NVD",
            id: "CVE-2020-8698",
         },
      ],
   },
   id: "VAR-202011-1361",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5185185333333333,
   },
   last_update_date: "2023-11-07T21:08:28.118000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "NTAP-20201113-0006 Intel Intel Product Security Center",
            trust: 0.8,
            url: "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html",
         },
         {
            title: "Intel Processors Fixes for access control error vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=135724",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205185 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205184 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205189 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205181 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix, and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205083 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix, and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205084 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix, and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205190 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205182 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205183 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205369 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205085 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205188 - security advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=rhsa-20205186 - security advisory",
         },
         {
            title: "Arch Linux Issues: ",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=cve-2020-8698 log",
         },
         {
            title: "Arch Linux Advisories: [ASA-202102-34] intel-ucode: information disclosure",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=asa-202102-34",
         },
         {
            title: "Citrix Security Bulletins: Citrix Hypervisor Security Update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=0196318f80fa91831e1ad927f423d728",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=0bfef52a44075162940391ee650c313e",
         },
         {
            title: "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03705 rev. 6 - BIOS November 2020 Security Updates",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=892287da75187b64a9430d6c2f52fb94",
         },
         {
            title: "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03705 rev. 6 - BIOS November 2020 Security Updates",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=f872c139829b190dd155b5676016edf1",
         },
         {
            title: "HP: HPSBHF03705 rev. 1 - BIOS November 2020 Security Updates",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=hpsbhf03705",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8698",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-668",
            trust: 1,
         },
         {
            problemtype: "Lack of information (CWE-noinfo) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            db: "NVD",
            id: "CVE-2020-8698",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.2,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-8698",
         },
         {
            trust: 1.7,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381",
         },
         {
            trust: 1.7,
            url: "https://security.netapp.com/advisory/ntap-20201113-0006/",
         },
         {
            trust: 1.7,
            url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/maagik5cxkbpgy3r4ur5vo56m7mklz43/",
         },
         {
            trust: 1.7,
            url: "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf",
         },
         {
            trust: 1.2,
            url: "https://access.redhat.com/security/cve/cve-2020-8698",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu91051134/",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-8696",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-8695",
         },
         {
            trust: 0.6,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.6,
            url: "https://access.redhat.com/security/cve/cve-2020-8695",
         },
         {
            trust: 0.6,
            url: "https://access.redhat.com/security/team/key/",
         },
         {
            trust: 0.6,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.6,
            url: "https://access.redhat.com/security/cve/cve-2020-8696",
         },
         {
            trust: 0.6,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/163863/red-hat-security-advisory-2021-3176-01.html",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.3959/",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/163757/red-hat-security-advisory-2021-3027-01.html",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021081834",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/160035/ubuntu-security-notice-usn-4628-2.html",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.4200/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.4153/",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/160018/ubuntu-security-notice-usn-4628-1.html",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/163772/red-hat-security-advisory-2021-3029-01.html",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-22-132-05",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.4327/",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/160187/red-hat-security-advisory-2020-5184-01.html",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021081125",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021083127",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2022.2355",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/163993/red-hat-security-advisory-2021-3364-01.html",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/intel-processors-information-disclosure-33881",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.4033/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.2905",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.4017/",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/162588/ubuntu-security-notice-usn-4628-3.html",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.4124/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.0423",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.2721",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021080915",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.2604",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.2945",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-49266",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.2672",
         },
         {
            trust: 0.6,
            url: "https://packetstormsecurity.com/files/160407/red-hat-security-advisory-2020-5369-01.html",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.1664",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.2797",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-24511",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-24512",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-24512",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-24489",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-24489",
         },
         {
            trust: 0.4,
            url: "https://listman.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-0549",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-0543",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-0549",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-0543",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-24511",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-0548",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-0548",
         },
         {
            trust: 0.2,
            url: "https://www.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.2,
            url: "https://access.redhat.com/security/updates/classification/#moderate",
         },
         {
            trust: 0.2,
            url: "https://usn.ubuntu.com/4628-1",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/668.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2020:5185",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-05",
         },
         {
            trust: 0.1,
            url: "https://support.hp.com/us-en/document/c06962236",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2021:3255",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2021:3323",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2021:3028",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2021:3029",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2020:5181",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.16.04.1",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.18.04.1",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.20.10.1",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.20.04.1",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2020:5183",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/4628-2",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/bugs/1903883",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.18.04.2",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.20.04.2",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.16.04.2",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.20.10.2",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8698",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            db: "PACKETSTORM",
            id: "163924",
         },
         {
            db: "PACKETSTORM",
            id: "163954",
         },
         {
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            db: "PACKETSTORM",
            id: "160191",
         },
         {
            db: "PACKETSTORM",
            id: "160018",
         },
         {
            db: "PACKETSTORM",
            id: "160188",
         },
         {
            db: "PACKETSTORM",
            id: "160035",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
         {
            db: "NVD",
            id: "CVE-2020-8698",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2020-8698",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            db: "PACKETSTORM",
            id: "163924",
         },
         {
            db: "PACKETSTORM",
            id: "163954",
         },
         {
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            db: "PACKETSTORM",
            id: "160191",
         },
         {
            db: "PACKETSTORM",
            id: "160018",
         },
         {
            db: "PACKETSTORM",
            id: "160188",
         },
         {
            db: "PACKETSTORM",
            id: "160035",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
         {
            db: "NVD",
            id: "CVE-2020-8698",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-11-12T00:00:00",
            db: "VULMON",
            id: "CVE-2020-8698",
         },
         {
            date: "2021-07-02T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            date: "2021-08-27T19:22:22",
            db: "PACKETSTORM",
            id: "163924",
         },
         {
            date: "2021-08-31T15:43:48",
            db: "PACKETSTORM",
            id: "163954",
         },
         {
            date: "2021-08-09T14:15:45",
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            date: "2021-08-10T14:49:53",
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            date: "2020-11-24T15:00:08",
            db: "PACKETSTORM",
            id: "160191",
         },
         {
            date: "2020-11-11T14:59:21",
            db: "PACKETSTORM",
            id: "160018",
         },
         {
            date: "2020-11-24T14:59:25",
            db: "PACKETSTORM",
            id: "160188",
         },
         {
            date: "2020-11-12T15:38:50",
            db: "PACKETSTORM",
            id: "160035",
         },
         {
            date: "2019-11-10T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
         {
            date: "2020-11-12T18:15:00",
            db: "NVD",
            id: "CVE-2020-8698",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "VULMON",
            id: "CVE-2020-8698",
         },
         {
            date: "2021-07-02T04:40:00",
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
         {
            date: "2022-05-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
         {
            date: "2022-04-26T16:33:00",
            db: "NVD",
            id: "CVE-2020-8698",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "PACKETSTORM",
            id: "160018",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
      ],
      trust: 0.7,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Intel(R)  Vulnerabilities in processor products",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-013420",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "access control error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201911-1657",
         },
      ],
      trust: 0.6,
   },
}

var-202106-0358
Vulnerability from variot

In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the AhciBusDxe, IdeBusDxe, NvmExpressDxe, SdHostDriverDxe, and SdMmcDeviceDxe drivers are 05.16.25, 05.26.25, 05.35.25, 05.43.25, and 05.51.25 (for Kernel 5.1 through 5.5). The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count

SMM Privilege Escalation 10

SMM Memory Corruption 12

DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. Insyde InsydeH2O Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0358",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic ipc377g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.25.44",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.2",
         },
         {
            model: "simatic ipc647e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.35.25",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.43.25",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "ruggedcom apr1808",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.4",
         },
         {
            model: "simatic ipc627e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc847e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.1",
         },
         {
            model: "simatic ipc677e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.26.25",
         },
         {
            model: "simatic ipc227g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.3",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.16.25",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.34.44",
         },
         {
            model: "simatic ipc327g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc127e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.42.44",
         },
         {
            model: "simatic ipc277g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc477e pro",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: null,
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
         {
            db: "NVD",
            id: "CVE-2020-27339",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.34.44",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.25.44",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.16.25",
                        versionStartIncluding: "5.1",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.42.44",
                        versionStartIncluding: "5.4",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.35.25",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.26.25",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.43.25",
                        versionStartIncluding: "5.4",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:ruggedcom_apr1808_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:ruggedcom_apr1808:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc127e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc227g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc277g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc327g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc377g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-27339",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This document was written by Vijay Sarvepalli.Statement Date:   March 01, 2022",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2020-27339",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.2,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2020-27339",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 6.7,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-27339",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-27339",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202106-1324",
                  trust: 0.6,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
         {
            db: "NVD",
            id: "CVE-2020-27339",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-1324",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the AhciBusDxe, IdeBusDxe, NvmExpressDxe, SdHostDriverDxe, and SdMmcDeviceDxe drivers are 05.16.25, 05.26.25, 05.35.25, 05.43.25, and 05.51.25 (for Kernel 5.1 through 5.5). The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count \n\n\n\n\nSMM Privilege Escalation 10 \n\n\n SMM Memory Corruption  12 \n\n\n DXE Memory Corruption 1CVE-2020-27339 Affected\nCVE-2020-5953 Affected\nCVE-2021-33625 Affected\nCVE-2021-33626 Affected\nCVE-2021-33627 Affected\nCVE-2021-41837 Affected\nCVE-2021-41838 Affected\nCVE-2021-41839 Affected\nCVE-2021-41840 Affected\nCVE-2021-41841 Affected\nCVE-2021-42059 Affected\nCVE-2021-42060 Not Affected\nCVE-2021-42113 Affected\nCVE-2021-42554 Affected\nCVE-2021-43323 Affected\nCVE-2021-43522 Affected\nCVE-2021-43615 Not Affected\nCVE-2021-45969 Not Affected\nCVE-2021-45970 Not Affected\nCVE-2021-45971 Not Affected\nCVE-2022-24030 Not Affected\nCVE-2022-24031 Not Affected\nCVE-2022-24069 Not Affected\nCVE-2022-28806 Unknown. Insyde InsydeH2O Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-27339",
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-27339",
            trust: 4,
         },
         {
            db: "SIEMENS",
            id: "SSA-306654",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97136454",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007558",
            trust: 0.8,
         },
         {
            db: "LENOVO",
            id: "LEN-73436",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-1324",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
         {
            db: "NVD",
            id: "CVE-2020-27339",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-1324",
         },
      ],
   },
   id: "VAR-202106-0358",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2023-12-18T11:38:07.442000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INSYDE-SA-2021001",
            trust: 0.8,
            url: "https://www.insyde.com/security-pledge/sa-2021001",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1,
         },
         {
            problemtype: "Improper authority management (CWE-269) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
         {
            db: "NVD",
            id: "CVE-2020-27339",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
         },
         {
            trust: 1.6,
            url: "https://security.netapp.com/advisory/ntap-20220216-0005/",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge/sa-2021001",
         },
         {
            trust: 0.8,
            url: "cve-2020-27339  ",
         },
         {
            trust: 0.8,
            url: "cve-2020-5953  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33625  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33626  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33627  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41837  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41838  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41839  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41840  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41841  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42059  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42060  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42113  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42554  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43323  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43522  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43615  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45969  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45970  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45971  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24030  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24031  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24069  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-28806  ",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu97136454/index.html",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-27339",
         },
         {
            trust: 0.6,
            url: "https://www.insyde.com/products",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/independent-bios-developers-multiple-vulnerabilities-via-uefi-37438",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-73436",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
         {
            db: "NVD",
            id: "CVE-2020-27339",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-1324",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
         {
            db: "NVD",
            id: "CVE-2020-27339",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-1324",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-01T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
         {
            date: "2021-06-16T16:15:07.897000",
            db: "NVD",
            id: "CVE-2020-27339",
         },
         {
            date: "2021-06-16T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-1324",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-28T07:09:00",
            db: "JVNDB",
            id: "JVNDB-2021-007558",
         },
         {
            date: "2022-07-12T17:42:04.277000",
            db: "NVD",
            id: "CVE-2020-27339",
         },
         {
            date: "2022-07-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-1324",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-1324",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-1324",
         },
      ],
      trust: 0.6,
   },
}

var-202202-0037
Vulnerability from variot

An issue was discovered in Kernel 5.x in Insyde InsydeH2O, affecting HddPassword. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count

SMM Privilege Escalation 10

SMM Memory Corruption 12

DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. Insyde InsydeH2O Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0037",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc377g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.2",
         },
         {
            model: "simatic ipc647e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.16.23",
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "fas\\/aff bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.4",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.51.22",
         },
         {
            model: "simatic ipc627e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc847e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.1",
         },
         {
            model: "simatic ipc677e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc227g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.3",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.35.23",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc327g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "ruggedcom ape1808",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc127e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.26.23",
         },
         {
            model: "simatic ipc277g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc477e pro",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.5",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.43.22",
         },
         {
            model: "insydeh2o",
            scope: null,
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
         {
            db: "NVD",
            id: "CVE-2021-33625",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.16.23",
                        versionStartIncluding: "5.1",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.26.23",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.35.23",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.43.22",
                        versionStartIncluding: "5.4",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.51.22",
                        versionStartIncluding: "5.5",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:fas\\/aff_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:ruggedcom_ape1808_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:ruggedcom_ape1808:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc127e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc277g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc227g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc327g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc377g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-33625",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This document was written by Vijay Sarvepalli.Statement Date:   March 01, 2022",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2021-33625",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 6.9,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.4,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:M/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Medium",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 6.9,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2021-33625",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:M/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.8,
                  impactScore: 6,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "High",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.5,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-33625",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Changed",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-33625",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202202-117",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
         {
            db: "NVD",
            id: "CVE-2021-33625",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-117",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "An issue was discovered in Kernel 5.x in Insyde InsydeH2O, affecting HddPassword. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count \n\n\n\n\nSMM Privilege Escalation 10 \n\n\n SMM Memory Corruption  12 \n\n\n DXE Memory Corruption 1CVE-2020-27339 Affected\nCVE-2020-5953 Affected\nCVE-2021-33625 Affected\nCVE-2021-33626 Affected\nCVE-2021-33627 Affected\nCVE-2021-41837 Affected\nCVE-2021-41838 Affected\nCVE-2021-41839 Affected\nCVE-2021-41840 Affected\nCVE-2021-41841 Affected\nCVE-2021-42059 Affected\nCVE-2021-42060 Not Affected\nCVE-2021-42113 Affected\nCVE-2021-42554 Affected\nCVE-2021-43323 Affected\nCVE-2021-43522 Affected\nCVE-2021-43615 Not Affected\nCVE-2021-45969 Not Affected\nCVE-2021-45970 Not Affected\nCVE-2021-45971 Not Affected\nCVE-2022-24030 Not Affected\nCVE-2022-24031 Not Affected\nCVE-2022-24069 Not Affected\nCVE-2022-28806 Unknown. Insyde InsydeH2O Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-33625",
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-33625",
            trust: 4,
         },
         {
            db: "SIEMENS",
            id: "SSA-306654",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97136454",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001343",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2022020319",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-73436",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-117",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
         {
            db: "NVD",
            id: "CVE-2021-33625",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-117",
         },
      ],
   },
   id: "VAR-202202-0037",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2023-12-18T10:53:47.586000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Insyde's Security Pledge Security Advisory",
            trust: 0.8,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            title: "Insyde InsydeH2O Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=180211",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-117",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1,
         },
         {
            problemtype: "Buffer error (CWE-119) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
         {
            db: "NVD",
            id: "CVE-2021-33625",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
         },
         {
            trust: 1.6,
            url: "https://security.netapp.com/advisory/ntap-20220222-0004/",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge/sa-2022014",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-33625",
         },
         {
            trust: 0.8,
            url: "cve-2020-27339  ",
         },
         {
            trust: 0.8,
            url: "cve-2020-5953  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33625  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33626  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33627  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41837  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41838  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41839  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41840  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41841  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42059  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42060  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42113  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42554  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43323  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43522  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43615  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45969  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45970  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45971  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24030  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24031  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24069  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-28806  ",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu97136454/index.html",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/independent-bios-developers-multiple-vulnerabilities-via-uefi-37438",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022020319",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-73436",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
         {
            db: "NVD",
            id: "CVE-2021-33625",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-117",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
         {
            db: "NVD",
            id: "CVE-2021-33625",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-117",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-01T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
         {
            date: "2022-02-03T02:15:06.930000",
            db: "NVD",
            id: "CVE-2021-33625",
         },
         {
            date: "2022-02-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-117",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-28T07:09:00",
            db: "JVNDB",
            id: "JVNDB-2022-001343",
         },
         {
            date: "2022-04-12T18:17:23.980000",
            db: "NVD",
            id: "CVE-2021-33625",
         },
         {
            date: "2022-03-03T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-117",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-117",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-117",
         },
      ],
      trust: 0.6,
   },
}

var-202110-0264
Vulnerability from variot

A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count

SMM Privilege Escalation 10

SMM Memory Corruption 12

DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. InsydeH2O Includes a vulnerability in incorporating functionality from an untrusted control area.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the PnpSmm, SmmResourceCheckDxe, and BeepStatusCode drivers are 05.08.23, 05.16.23, 05.26.23, 05.35.23, 05.43.23, and 05.51.23 (for Kernel 5.0 up to and including 5.5)

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202110-0264",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic ipc377g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.25.44",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.2",
         },
         {
            model: "simatic ipc647e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.35.25",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.43.25",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "ruggedcom apr1808",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.4",
         },
         {
            model: "simatic ipc627e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc847e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.1",
         },
         {
            model: "simatic ipc677e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.26.25",
         },
         {
            model: "simatic ipc227g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.3",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.16.25",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.34.44",
         },
         {
            model: "simatic ipc327g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc127e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.42.44",
         },
         {
            model: "simatic ipc277g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "simatic ipc477e pro",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: null,
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
         {
            db: "NVD",
            id: "CVE-2021-33626",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.34.44",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.25.44",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.16.25",
                        versionStartIncluding: "5.1",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.42.44",
                        versionStartIncluding: "5.4",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.35.25",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.26.25",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.43.25",
                        versionStartIncluding: "5.4",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:ruggedcom_apr1808_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:ruggedcom_apr1808:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc127e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc227g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc277g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc327g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc377g_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-33626",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This document was written by Vijay Sarvepalli.Statement Date:   March 01, 2022",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2021-33626",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.6,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Partial",
                  baseScore: 4.6,
                  confidentialityImpact: "Partial",
                  exploitabilityScore: null,
                  id: "CVE-2021-33626",
                  impactScore: null,
                  integrityImpact: "Partial",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-33626",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "Low",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-33626",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202109-2000",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
         {
            db: "NVD",
            id: "CVE-2021-33626",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-2000",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count \n\n\n\n\nSMM Privilege Escalation 10 \n\n\n SMM Memory Corruption  12 \n\n\n DXE Memory Corruption 1CVE-2020-27339 Affected\nCVE-2020-5953 Affected\nCVE-2021-33625 Affected\nCVE-2021-33626 Affected\nCVE-2021-33627 Affected\nCVE-2021-41837 Affected\nCVE-2021-41838 Affected\nCVE-2021-41839 Affected\nCVE-2021-41840 Affected\nCVE-2021-41841 Affected\nCVE-2021-42059 Affected\nCVE-2021-42060 Not Affected\nCVE-2021-42113 Affected\nCVE-2021-42554 Affected\nCVE-2021-43323 Affected\nCVE-2021-43522 Affected\nCVE-2021-43615 Not Affected\nCVE-2021-45969 Not Affected\nCVE-2021-45970 Not Affected\nCVE-2021-45971 Not Affected\nCVE-2022-24030 Not Affected\nCVE-2022-24031 Not Affected\nCVE-2022-24069 Not Affected\nCVE-2022-28806 Unknown. InsydeH2O Includes a vulnerability in incorporating functionality from an untrusted control area.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state. In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the PnpSmm, SmmResourceCheckDxe, and BeepStatusCode drivers are 05.08.23, 05.16.23, 05.26.23, 05.35.23, 05.43.23, and 05.51.23 (for Kernel 5.0 up to and including 5.5)",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-33626",
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
         {
            db: "VULMON",
            id: "CVE-2021-33626",
         },
      ],
      trust: 2.43,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-33626",
            trust: 4.1,
         },
         {
            db: "SIEMENS",
            id: "SSA-306654",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97136454",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007559",
            trust: 0.8,
         },
         {
            db: "LENOVO",
            id: "LEN-73436",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-2000",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2021-33626",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "VULMON",
            id: "CVE-2021-33626",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
         {
            db: "NVD",
            id: "CVE-2021-33626",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-2000",
         },
      ],
   },
   id: "VAR-202110-0264",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2023-12-18T11:10:01.956000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Insyde's Security Pledge Security Advisory",
            trust: 0.8,
            url: "https://www.insyde.com/security-pledge",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-829",
            trust: 1,
         },
         {
            problemtype: "Incorporating features from untrusted control areas (CWE-829) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
         {
            db: "NVD",
            id: "CVE-2021-33626",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://www.insyde.com/security-pledge/sa-2021001",
         },
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
         },
         {
            trust: 1.6,
            url: "https://security.netapp.com/advisory/ntap-20220216-0006/",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-33626",
         },
         {
            trust: 0.8,
            url: "cve-2020-27339  ",
         },
         {
            trust: 0.8,
            url: "cve-2020-5953  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33625  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33626  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33627  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41837  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41838  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41839  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41840  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41841  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42059  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42060  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42113  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42554  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43323  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43522  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43615  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45969  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45970  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45971  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24030  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24031  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24069  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-28806  ",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu97136454/index.html",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/independent-bios-developers-multiple-vulnerabilities-via-uefi-37438",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-73436",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "VULMON",
            id: "CVE-2021-33626",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
         {
            db: "NVD",
            id: "CVE-2021-33626",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-2000",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "VULMON",
            id: "CVE-2021-33626",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
         {
            db: "NVD",
            id: "CVE-2021-33626",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202109-2000",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-01T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2021-10-01T00:00:00",
            db: "VULMON",
            id: "CVE-2021-33626",
         },
         {
            date: "2022-02-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
         {
            date: "2021-10-01T03:15:06.593000",
            db: "NVD",
            id: "CVE-2021-33626",
         },
         {
            date: "2021-09-30T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-2000",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2021-10-01T00:00:00",
            db: "VULMON",
            id: "CVE-2021-33626",
         },
         {
            date: "2022-02-28T07:09:00",
            db: "JVNDB",
            id: "JVNDB-2021-007559",
         },
         {
            date: "2022-04-24T02:03:42.070000",
            db: "NVD",
            id: "CVE-2021-33626",
         },
         {
            date: "2022-03-10T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202109-2000",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202109-2000",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202109-2000",
         },
      ],
      trust: 0.6,
   },
}

var-202106-0696
Vulnerability from variot

Improper buffer restrictions in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32 and 15.0.22 may allow a privileged user to potentially enable escalation of privilege via local access. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0696",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "13.0.47",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "13.30.17",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "14.1.53",
         },
         {
            model: "cloud backup",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "14.5.32",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "12.0.81",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.12.86",
         },
         {
            model: "simatic ipc477e pro",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc647e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic ipc847e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.8.86",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "15.0.22",
         },
         {
            model: "simatic ipc677e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic ipc547g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc627e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.22.86",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc527g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-8703",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "12.0.81",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b360:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b365:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h310:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h370:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:mobile_cm246:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q370:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z390:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "12.0.81",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b360:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b365:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h310:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h370:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:mobile_cm246:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q370:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z390:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "13.0.47",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.0.47",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "13.30.17",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3_l13g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5_l16g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.30.17",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3_l13g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5_l16g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "14.1.53",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "14.1.53",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "14.5.32",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "14.5.32",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "11.8.86",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b150:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_m3-7y32:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h110:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h170:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q150:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q170:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z170:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "11.8.86",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b150:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b250:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m3-7y32:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h110:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h170:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q150:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q170:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q250:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z170:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "11.12.86",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c420:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "11.12.86",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c420:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "11.22.86",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c621a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "11.22.86",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c621a:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "15.0.22",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-11100b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11500b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900kb:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "15.0.22",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-11100b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11500b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900kb:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-8703",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens reported these vulnerabilities to CISA.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-559",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2020-8703",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.6,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "CVE-2020-8703",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "MEDIUM",
                  trust: 1.1,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.8,
                  id: "CVE-2020-8703",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-8703",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202106-559",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-8703",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8703",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-559",
         },
         {
            db: "NVD",
            id: "CVE-2020-8703",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Improper buffer restrictions in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32 and 15.0.22 may allow a privileged user to potentially enable escalation of privilege via local access. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-8703",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8703",
         },
      ],
      trust: 1.53,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "SIEMENS",
            id: "SSA-309571",
            trust: 1.7,
         },
         {
            db: "NVD",
            id: "CVE-2020-8703",
            trust: 1.7,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.1997",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021081109",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021061712",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-222-05",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-51731",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-559",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2020-8703",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8703",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-559",
         },
         {
            db: "NVD",
            id: "CVE-2020-8703",
         },
      ],
   },
   id: "VAR-202106-0696",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5185185333333333,
   },
   last_update_date: "2022-05-04T08:21:47.847000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Intel(R) CSME Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=155254",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=240e27e5c8fba28153598a375a2a4130",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8703",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-559",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-8703",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html",
         },
         {
            trust: 1.7,
            url: "https://security.netapp.com/advisory/ntap-20210611-0004/",
         },
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021081109",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-51731",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/intel-processor-multiple-vulnerabilities-via-csme-sps-lms-35670",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021061712",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.1997",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-222-05",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/119.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://cert-portal.siemens.com/productcert/txt/ssa-309571.txt",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8703",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-559",
         },
         {
            db: "NVD",
            id: "CVE-2020-8703",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2020-8703",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-559",
         },
         {
            db: "NVD",
            id: "CVE-2020-8703",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-06-09T00:00:00",
            db: "VULMON",
            id: "CVE-2020-8703",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-06-08T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-559",
         },
         {
            date: "2021-06-09T19:15:00",
            db: "NVD",
            id: "CVE-2020-8703",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-08-10T00:00:00",
            db: "VULMON",
            id: "CVE-2020-8703",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2022-04-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-559",
         },
         {
            date: "2022-04-22T16:20:00",
            db: "NVD",
            id: "CVE-2020-8703",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-559",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Pillow Buffer error vulnerability",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
}

var-202106-0350
Vulnerability from variot

Out of bound read in a subsystem in the Intel(R) CSME versions before 12.0.81, 13.0.47, 13.30.17, 14.1.53 and 14.5.32 may allow a privileged user to potentially enable information disclosure via local access. Intel(R) CSME Is vulnerable to an out-of-bounds read.Information may be obtained. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0350",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "13.0.47",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "13.30.17",
         },
         {
            model: "simatic ipc677e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc627e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "14.1.53",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "14.5.32",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "12.0.81",
         },
         {
            model: "simatic ipc847e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic ipc647e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "14.1.53",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "14.5.32",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: null,
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "13.30.17",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "12.0.81",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "13.0.47",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008544",
         },
         {
            db: "NVD",
            id: "CVE-2020-24506",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "12.0.81",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b360:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b365:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h310:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h370:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:mobile_cm246:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q370:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z390:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "12.0.81",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b360:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b365:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h310:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h370:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:mobile_cm246:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q370:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z390:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "13.0.47",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.0.47",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "13.30.17",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3_l13g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5_l16g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.30.17",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3_l13g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5_l16g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "14.1.53",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "14.1.53",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "14.5.32",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "14.5.32",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-24506",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens reported these vulnerabilities to CISA.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-558",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2020-24506",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "NONE",
                  baseScore: 2.1,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "CVE-2020-24506",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "LOW",
                  trust: 1.9,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.8,
                  id: "CVE-2020-24506",
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4.4,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-24506",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-24506",
                  trust: 1.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202106-558",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-24506",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-24506",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008544",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-558",
         },
         {
            db: "NVD",
            id: "CVE-2020-24506",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Out of bound read in a subsystem in the Intel(R) CSME versions before 12.0.81, 13.0.47, 13.30.17, 14.1.53 and 14.5.32 may allow a privileged user to potentially enable information disclosure via local access. Intel(R) CSME Is vulnerable to an out-of-bounds read.Information may be obtained. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-24506",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008544",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2020-24506",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-24506",
            trust: 3.3,
         },
         {
            db: "SIEMENS",
            id: "SSA-309571",
            trust: 1.7,
         },
         {
            db: "JVN",
            id: "JVNVU99965981",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008544",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.1997",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021081109",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021061712",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-222-05",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-51731",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-558",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2020-24506",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-24506",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008544",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-558",
         },
         {
            db: "NVD",
            id: "CVE-2020-24506",
         },
      ],
   },
   id: "VAR-202106-0350",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2022-05-04T06:52:37.371000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INTEL-SA-00459",
            trust: 0.8,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html",
         },
         {
            title: "Intel(R) CSME Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=155253",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=240e27e5c8fba28153598a375a2a4130",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-24506",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008544",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-558",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-125",
            trust: 1,
         },
         {
            problemtype: "Out-of-bounds read (CWE-125) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008544",
         },
         {
            db: "NVD",
            id: "CVE-2020-24506",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html",
         },
         {
            trust: 1.7,
            url: "https://security.netapp.com/advisory/ntap-20210611-0004/",
         },
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu99965981/",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-24506",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021081109",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-51731",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/intel-processor-multiple-vulnerabilities-via-csme-sps-lms-35670",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021061712",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.1997",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-222-05",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/125.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://cert-portal.siemens.com/productcert/txt/ssa-309571.txt",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-24506",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008544",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-558",
         },
         {
            db: "NVD",
            id: "CVE-2020-24506",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2020-24506",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008544",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-558",
         },
         {
            db: "NVD",
            id: "CVE-2020-24506",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-06-09T00:00:00",
            db: "VULMON",
            id: "CVE-2020-24506",
         },
         {
            date: "2022-03-18T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-008544",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-06-08T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-558",
         },
         {
            date: "2021-06-09T19:15:00",
            db: "NVD",
            id: "CVE-2020-24506",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-08-10T00:00:00",
            db: "VULMON",
            id: "CVE-2020-24506",
         },
         {
            date: "2022-03-18T08:16:00",
            db: "JVNDB",
            id: "JVNDB-2021-008544",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2022-04-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-558",
         },
         {
            date: "2022-04-22T16:20:00",
            db: "NVD",
            id: "CVE-2020-24506",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-558",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Intel(R) CSME  Out-of-bounds read vulnerability",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008544",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
}

var-202006-0241
Vulnerability from variot

Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel 06_3DH and Intel 06_9EH are both a central processing unit (CPU) product of Intel Corporation of the United States. Security vulnerabilities exist in several Intel products. The following products and versions are affected: Intel Celeron 1000M; Celeron 1005M; Celeron 1007U; Celeron 1019Y; Celeron 1020m, etc. (CVE-2020-12654).

The microcode update for HEDT and Xeon CPUs with signature 0x50654 which was reverted in DSA 4565-2 is now included again with a fixed release.

The upstream update for Skylake-U/Y (signature 0x406e3) had to be excluded from this update due to reported hangs on boot.

For the stable distribution (buster), these problems have been fixed in version 3.20200609.2~deb10u1.

We recommend that you upgrade your intel-microcode packages.

For the detailed security status of intel-microcode please refer to its security tracker page at: https://security-tracker.debian.org/tracker/intel-microcode

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----

iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl7iSvVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RH6g/9FYOaN5XyFFC8jVEmfdIl0pa8SqEH2+V1s27pAEOMhGAXuLrUms9wDq0J IoM54q/dz3rH3GiSi5nNqQDxLGx40DNSM5CCdCZIC22YvALS3aYsqpSSlDiyQZSb Im7isH8ntWIc3bedPWzfhui4VA19p8gnbFUetts3fp+uPeimd/QfPnJDN8wHUAL1 V2JzHMYD8v9axenbOxuWSArSnbubEtwpmHfhMzIMkE5150qhyofpzPBsKGoASa7q kPrwbUKBC11dGi+sV49rpXTf/ml7KDUDIrsA75sLC9WhckBcMdAkkVPLJyytAZ6A SqaOVJv+j0wVmhTtIqPxjvYCvX0y8i6NyQi+aliqzq7uEiQtaPQV8sWgDhyhTWga kxxiNuLfcuiEKkKToHdrkLLI1JiisqQTcwyRHg6k3X8+sNmKe6vFu3KzVbLo8+MH c3zEDQHP7XHm/euneb5ZFdg7+Rli03KWFm8/LNJQhrDcsFU/Si5268OwnzpGydwc eaIwuHtc8R64q+m5Aujo7X7kKk67zN7XhmX0nbr9Egni7dhG3iVrMtF27BTPMcML Gzz1pjktlYiySJYON64N/ooZchwAoAEhM9F1yPREXNf6PfRQG3lNjX3UeC4Ci0Ay /NuaKQSSlwd3XOy/dajSEfceu8uI/RZQ3RccTZRtWT58qcnwAnE= =cQzh -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Important: microcode_ctl security, bug fix and enhancement update Advisory ID: RHSA-2021:3028-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:3028 Issue date: 2021-08-09 CVE Names: CVE-2020-0543 CVE-2020-0548 CVE-2020-0549 CVE-2020-8695 CVE-2020-8696 CVE-2020-8698 CVE-2020-24489 CVE-2020-24511 CVE-2020-24512 ==================================================================== 1. Summary:

An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

  1. Relevant releases/architectures:

Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64

  1. Description:

The microcode_ctl packages provide microcode updates for Intel.

Security Fix(es):

  • hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)

  • hw: Vector Register Data Sampling (CVE-2020-0548)

  • hw: L1D Cache Eviction Sampling (CVE-2020-0549)

  • hw: vt-d related privilege escalation (CVE-2020-24489)

  • hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)

  • hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)

  • hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)

  • hw: Vector Register Leakage-Active (CVE-2020-8696)

  • hw: Fast forward store predictor (CVE-2020-8698)

  • Solution:

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

  1. Bugs fixed (https://bugzilla.redhat.com/):

1788786 - CVE-2020-0548 hw: Vector Register Data Sampling 1788788 - CVE-2020-0549 hw: L1D Cache Eviction Sampling 1827165 - CVE-2020-0543 hw: Special Register Buffer Data Sampling (SRBDS) 1828583 - CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface 1890355 - CVE-2020-8696 hw: Vector Register Leakage-Active 1890356 - CVE-2020-8698 hw: Fast forward store predictor 1897684 - [rhel-7.9.z] Re-enable 06-5e-03 (SKL-H/S, CPUID 0x506e3) latest microcode updates 1962650 - CVE-2020-24489 hw: vt-d related privilege escalation 1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors 1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors

  1. Package List:

Red Hat Enterprise Linux Client (v. 7):

Source: microcode_ctl-2.1-73.11.el7_9.src.rpm

x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm

Red Hat Enterprise Linux ComputeNode (v. 7):

Source: microcode_ctl-2.1-73.11.el7_9.src.rpm

x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm

Red Hat Enterprise Linux Server (v. 7):

Source: microcode_ctl-2.1-73.11.el7_9.src.rpm

x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm

Red Hat Enterprise Linux Workstation (v. 7):

Source: microcode_ctl-2.1-73.11.el7_9.src.rpm

x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/

  1. References:

https://access.redhat.com/security/cve/CVE-2020-0543 https://access.redhat.com/security/cve/CVE-2020-0548 https://access.redhat.com/security/cve/CVE-2020-0549 https://access.redhat.com/security/cve/CVE-2020-8695 https://access.redhat.com/security/cve/CVE-2020-8696 https://access.redhat.com/security/cve/CVE-2020-8698 https://access.redhat.com/security/cve/CVE-2020-24489 https://access.redhat.com/security/cve/CVE-2020-24511 https://access.redhat.com/security/cve/CVE-2020-24512 https://access.redhat.com/security/updates/classification/#important

  1. Contact:

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1

iQIVAwUBYRD++tzjgjWX9erEAQhA1A//eeO88DFGpTcHgCHrsXimUtK3MZX0RppT 5UOWuXgmPJniMPDALpkfTNTnNGASjBB+WDclaW2d/sZf52PzYLao5wGVIYdUx3Nl l9IvbGNMm0F7eI7aHdT2QnUhQQl1IpJrbmkhvBM2w85EmOfqlq+CpXnJMRXzoRdv sFPrWAo1opDNnBV6iYAnyULHFuWwcvU28n3JU945W8p/PvqJgSze77i4dmpzYkBj ljzVrIUl2pizBmnQMj03JJ+YeB8+oKb0uD2RdqHoxkUSFGH9OW6s/qytHu/eR4uL Y7WmIfHUxGsVRcmIjo/VaAvvWs4A3hdOL3nGdRAMQOKp+VoDcX7VDNURoxK/bkcJ OepHSyfWPCVXvOmU5l2ov1uzVQ/F+ajeevMehuzwQlTAIur5qE2eQ2Mwitfh/7WZ W3x67peCz51zVPtb7rkQfpzQzZKkjSAAclOYMzltv2PA5vSXZy8+hEqWZwqtesQn ltz36bjQMvRRhr1yGDbaFI5dcTB8T/eIkzmD6wPfbd7r7SEuE0GUd8Yf69VghGL2 f+mvR8oWb2x3RHXbpFm4aIt5mJHqIgfXDAohz7lXgLyJwQefyeJ5w+W8nOe+ZSK/ yvfiVQZz9tvPq8yqC87YWTA7zcnhoSmPvXRicJakpfJL/oz043Tc17jqxIra36sA UjXnNBNse8A=LIYI -----END PGP SIGNATURE-----

-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . (CVE-2020-0548)

It was discovered that on some Intel processors, data from the most recently evicted modified L1 data cache (L1D) line may be propagated into an unused (invalid) L1D fill buffer. ========================================================================= Ubuntu Security Notice USN-4393-1 June 10, 2020

linux vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description: - linux: Linux kernel

Details:

It was discovered that the Marvell WiFi-Ex Driver in the Linux kernel did not properly validate status lengths in messages received from an access point, leading to a buffer overflow. A physically proximate attacker controlling an access point could use this to construct messages that could possibly result in arbitrary code execution. (CVE-2020-12654)

It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. (CVE-2020-0543)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 12.04 ESM: linux-image-3.2.0-147-generic 3.2.0-147.194 linux-image-3.2.0-147-generic-pae 3.2.0-147.194 linux-image-3.2.0-147-highbank 3.2.0-147.194 linux-image-3.2.0-147-powerpc-smp 3.2.0-147.194 linux-image-3.2.0-147-powerpc64-smp 3.2.0-147.194 linux-image-3.2.0-147-virtual 3.2.0-147.194 linux-image-generic 3.2.0.147.161 linux-image-generic-pae 3.2.0.147.161 linux-image-highbank 3.2.0.147.161 linux-image-powerpc 3.2.0.147.161 linux-image-powerpc-smp 3.2.0.147.161 linux-image-powerpc64-smp 3.2.0.147.161 linux-image-server 3.2.0.147.161 linux-image-virtual 3.2.0.147.161

Please note that the mitigation for CVE-2020-0543 requires a processor microcode update to be applied, either from your system manufacturer or via the intel-microcode package. The kernel update for this issue provides the ability to disable the mitigation and to report vulnerability status.

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202006-0241",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "core i3-3217ue",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8120",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6600t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1245 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7007u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7400",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4010y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7210u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4010u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 4405y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3560y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 3765u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g5400",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-5675c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8100",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3240",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "19.10",
         },
         {
            model: "core i7-8705g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium a1018 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1125c v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6310u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1270 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g3900te",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3120m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 1037u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3450t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-9850h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3220t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc627e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.06",
         },
         {
            model: "core i7-8569u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 1000m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1505l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7820hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2124",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3229y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m5-6y54",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4430s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8400",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4030u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7920hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7300u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2146g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc427d",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "xeon e3-1505m v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6600",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2184g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7567u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1280 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3470",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6820hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2286m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8709g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6300u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core 4205u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4130",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1225 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc477e pro",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.14",
         },
         {
            model: "core i7-7700t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7320t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6510u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m-5y10c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3840qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7100u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 3865u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic itp1000",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "23.01.08",
         },
         {
            model: "celeron 2957u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 1020m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6100e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3689y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1265l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4402ec",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3517ue",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4250u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3520m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8400h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7442eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1225 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8700k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1245 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2174g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1285l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8400b",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 3965y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3570k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4700ec",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-9600k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4160t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-5350u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7y75",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m3-7y30",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1501l v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6567u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3439y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3570",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6870hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1286 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g1620t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4030y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4258u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4702mq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1220 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-9400",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3220t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1585l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6300",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4100m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1268l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5700hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4590t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3555le",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4770s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1290 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1246 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1275 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g3930te",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8300t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8350k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "threat intelligence exchange server",
            scope: "lte",
            trust: 1,
            vendor: "mcafee",
            version: "2.3.1",
         },
         {
            model: "pentium g5400t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1271 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4750hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g3900t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3360m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8130u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-10510u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc627d",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "core i7-3612qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g5500",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic field pg m6",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "26.01.07",
         },
         {
            model: "xeon e3-1505l v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4288u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4810mq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4370",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 927ue",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m-5y70",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1275 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1545m v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4350u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3260",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1258l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2276me",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4005u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-5015u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7440eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7102e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8600k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4570r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i9-8950hk",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 2981u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4020y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6100h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3350p",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g3920",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-5575r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1240l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 5305u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m-5y10",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3610me",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1105c v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3610qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2244g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1220 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-5010u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g4900",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1105c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1270 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1281 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1515m v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "leap",
            scope: "eq",
            trust: 1,
            vendor: "opensuse",
            version: "15.1",
         },
         {
            model: "celeron 1020e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7500",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2124g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4500u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-5005u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3635qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7400t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5750hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4360",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7101te",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1225 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4500",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4790t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6100u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8300h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-9700k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4712mq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7600u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4785t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7360u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2234",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8020",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4300u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3317u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4540",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g5600",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "18.04",
         },
         {
            model: "core m7-6y75",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4520",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4360t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3430",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6110u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6650u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3217u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 725c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6440eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4012y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5950hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4860hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8259u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc427e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.14",
         },
         {
            model: "xeon e3-1505m v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6360u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3320m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4200u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7167u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3340m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m-5y10a",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3420t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8100t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 1019y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3765u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4710hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3225",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4400t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3210m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium gold 6405u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4670r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4600u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1245 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3210",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8700b",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1278l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7560u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3667u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6400t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8670t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3825u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g2140 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g5500t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6267u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "threat intelligence exchange server",
            scope: "gte",
            trust: 1,
            vendor: "mcafee",
            version: "2.0.0",
         },
         {
            model: "celeron g1610",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7260u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4670k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5775c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-9600kf",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4760hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7500t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m3-6y30",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1230 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6820hk",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6500",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4770r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4400te",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1558l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6500te",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g3902e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3250t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1240 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2276g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4278u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5650u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3240t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3340s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4210y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7110u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3450",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic field pg m5",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "22.01.08",
         },
         {
            model: "core i5-4690s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8400t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6100",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3205u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8265u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g1820t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6500u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6700t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7y57",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3940xm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8700t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc677d",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "celeron 2980u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g3920t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4158u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "20.04",
         },
         {
            model: "core i9-9900k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3460",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1501m v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2284g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3556u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4400",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-5350",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7020u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1220l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6820eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3227u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g2120t v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4210h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1578l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4590",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3920xm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3770k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3558u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4570",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4770t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7120",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4220y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1280 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8700",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8100h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2278g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4300y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4900mq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5850hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g4920",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4370t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i9-9880h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3250",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6120t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2226ge",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1245 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1230l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m5-6y57",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8809g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8420",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g2030 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m-5y51",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1220 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4690t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6822eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g2100t v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4100u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1286l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6100t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i9-9900kf",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 2129y v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1225 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8250u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1260l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 2030m v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc527g",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1.4.0",
         },
         {
            model: "core 9750hf",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3570t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3450s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m3-8100y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core 4410y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6500t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 1405 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3560m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6320t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3330",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6700te",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2126g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8557u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4330t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc847d",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "pentium g5420",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1240 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g2010 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3770t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "12.04",
         },
         {
            model: "pentium g2130 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8210y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3230m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7300hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1235 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1241 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3250",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g1850",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-10210y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 1017u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4670",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3220",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc477e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "21.01.14",
         },
         {
            model: "core i3-4110m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8850h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4308u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8550",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4130t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4500t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7200u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 1047ue",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3615qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5600u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-5157u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1240 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7267u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3632qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3470s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6660u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4120u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4202y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 2020m v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 2955u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3260t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2288g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-i3-8100h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7700hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "leap",
            scope: "eq",
            trust: 1,
            vendor: "opensuse",
            version: "15.2",
         },
         {
            model: "celeron g3940",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3612qe",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 2127u v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3820qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2186m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3537u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8500t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4770hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4170",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4770k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7510u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4440s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1125c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4150t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4350",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core 4415y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6300t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3440",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3380m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1575m v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-5257u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2134",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1280 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3340",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4590s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3770",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6770hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6350hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1235l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8420t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4440",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4260u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5557u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8500b",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7700",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8000",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4765t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6120",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7700k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2276ml",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 3755u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6400",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4710mq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7500u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-2115c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4025u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g2020 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7100e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2176m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc547g",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "r1.28.0",
         },
         {
            model: "celeron g1840",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4150",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8145u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4670s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6260u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4722hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4790s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7740x",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "31",
         },
         {
            model: "core i5-10210u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7600t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g3900",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i9-9980hk",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic field pg m4",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "celeron g1840t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4570s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g4950",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g1610t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6287u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6600u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3450",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4210u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7440hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3610qe",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3615qe",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4460",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g4900t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4980hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 3955u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4558u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1220 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2278gel",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2224g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc647e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.06",
         },
         {
            model: "core 8269u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3805u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-9400h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7820hk",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3550s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-5200u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2254me",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "14.04",
         },
         {
            model: "xeon e3-1270",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3115c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3240",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4670t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7660u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1535m v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g1630",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "fedora",
            scope: "eq",
            trust: 1,
            vendor: "fedoraproject",
            version: "32",
         },
         {
            model: "core i5-3475s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7600",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6200u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1226 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1280 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3330s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core 9300h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8565u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4700eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6700",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium b925c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2236",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7120t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 4405u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1265l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3470t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4170t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4702ec",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3420",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1275l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium b915c",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6920hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8670",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8510y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4578u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4700hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-9700kf",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3460t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g5420t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2144g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2136",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7101e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7600k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4870hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3240t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2224",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3120me",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-7820eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3540m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1275 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-10510y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4200y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4330",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4520t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc647d",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "core m-5y3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 2970m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1285 v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8600",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5550u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8706g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 1007u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4790",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8559u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4700mq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4690",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2274g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3550",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3258",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-9400f",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "threat intelligence exchange server",
            scope: "eq",
            trust: 1,
            vendor: "mcafee",
            version: "3.0.0",
         },
         {
            model: "core i5-3437u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4702hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7340",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3517u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2276m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3770s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6210u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4712hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6700hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6100te",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6320",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4550u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4460t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc827d",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "core i3-6167u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-5287u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc847e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.06",
         },
         {
            model: "celeron g1820",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1585 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1230 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3570s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8305g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g2120 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2246g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1270 v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc3000 smart",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1.b",
         },
         {
            model: "core i5-6442eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4800mq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-5250u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8650u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7640x",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2278ge",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8310y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8650k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6440hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6300hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3440t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1240l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6560u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1268l v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8650",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1276 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1240 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1230 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "ubuntu linux",
            scope: "eq",
            trust: 1,
            vendor: "canonical",
            version: "16.04",
         },
         {
            model: "core i3-3130m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1220l v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g4930",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3110m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8750h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc347e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "core i5-10310y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4570t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g2020t v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1231 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3720qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3687u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simotion p320-4e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "pentium g3470",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3561y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-6600k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1230 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5850eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4910mq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3630qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8500",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3427u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1565l v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6700k",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-6970hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8200y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8365u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4430",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7500u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4960hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7130u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g1830",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4350t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8560u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g1620",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3665u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2176g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 3965u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8550u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core m-5y71",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8600t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4720hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1285 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron 1005m",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3337u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1275 v5",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8109u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-10110y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-7100h",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 4415u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1265l v4",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 2117u v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7y54",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4610y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-5006u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simotion p320-4s",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "core 5405u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-8300",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1285 v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4510u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-3339y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5700eq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2186g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4770",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8665u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4420t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2254ml",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc677e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.06",
         },
         {
            model: "core i5-4302y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3245",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-3740qm",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-4460s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-3250t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4160",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e-2226g",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-8350u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc477d",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "core i3-8000t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5775r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4650u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "celeron g3930e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4950hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g4420",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1535m v6",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-7287u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium 3215u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc547e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "celeron 3855u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4850hq",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon e3-1221 v3",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-8500y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g2030t v2",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-4340",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-5500u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i5-5675r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i7-4771",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "pentium g3220",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-5020u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "core i3-6102e",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-0543",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Red Hat",
      sources: [
         {
            db: "PACKETSTORM",
            id: "163956",
         },
         {
            db: "PACKETSTORM",
            id: "163757",
         },
         {
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            db: "PACKETSTORM",
            id: "163772",
         },
      ],
      trust: 0.4,
   },
   cve: "CVE-2020-0543",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 2.1,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "CVE-2020-0543",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "LOW",
                  trust: 1.1,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "NONE",
                  baseScore: 2.1,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "VHN-161977",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  severity: "LOW",
                  trust: 0.1,
                  vectorString: "AV:L/AC:L/AU:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "nvd@nist.gov",
                  availabilityImpact: "NONE",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2020-0543",
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2020-0543",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-161977",
                  trust: 0.1,
                  value: "LOW",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-0543",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-161977",
         },
         {
            db: "VULMON",
            id: "CVE-2020-0543",
         },
         {
            db: "NVD",
            id: "CVE-2020-0543",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel 06_3DH and Intel 06_9EH are both a central processing unit (CPU) product of Intel Corporation of the United States. Security vulnerabilities exist in several Intel products. The following products and versions are affected: Intel Celeron 1000M; Celeron 1005M; Celeron 1007U; Celeron 1019Y; Celeron 1020m, etc. (CVE-2020-12654). \n\nThe microcode update for HEDT and Xeon CPUs with signature 0x50654 which\nwas reverted in DSA 4565-2 is now included again with a fixed release. \n\nThe upstream update for Skylake-U/Y (signature 0x406e3) had to be\nexcluded from this update due to reported hangs on boot. \n\nFor the stable distribution (buster), these problems have been fixed in\nversion 3.20200609.2~deb10u1. \n\nWe recommend that you upgrade your intel-microcode packages. \n\nFor the detailed security status of intel-microcode please refer to its\nsecurity tracker page at:\nhttps://security-tracker.debian.org/tracker/intel-microcode\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\n/NuaKQSSlwd3XOy/dajSEfceu8uI/RZQ3RccTZRtWT58qcnwAnE=\n=cQzh\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n====================================================================                   \nRed Hat Security Advisory\n\nSynopsis:          Important: microcode_ctl security, bug fix and enhancement update\nAdvisory ID:       RHSA-2021:3028-01\nProduct:           Red Hat Enterprise Linux\nAdvisory URL:      https://access.redhat.com/errata/RHSA-2021:3028\nIssue date:        2021-08-09\nCVE Names:         CVE-2020-0543 CVE-2020-0548 CVE-2020-0549\n                   CVE-2020-8695 CVE-2020-8696 CVE-2020-8698\n                   CVE-2020-24489 CVE-2020-24511 CVE-2020-24512\n====================================================================\n1. Summary:\n\nAn update for microcode_ctl is now available for Red Hat Enterprise Linux\n7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. Description:\n\nThe microcode_ctl packages provide microcode updates for Intel. \n\nSecurity Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* hw: improper isolation of shared resources in some Intel Processors\n(CVE-2020-24511)\n\n* hw: observable timing discrepancy in some Intel Processors\n(CVE-2020-24512)\n\n* hw: Information disclosure issue in Intel SGX via RAPL interface\n(CVE-2020-8695)\n\n* hw: Vector Register Leakage-Active (CVE-2020-8696)\n\n* hw: Fast forward store predictor (CVE-2020-8698)\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1788786 - CVE-2020-0548 hw: Vector Register Data Sampling\n1788788 - CVE-2020-0549 hw: L1D Cache Eviction Sampling\n1827165 - CVE-2020-0543 hw: Special Register Buffer Data Sampling (SRBDS)\n1828583 - CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface\n1890355 - CVE-2020-8696 hw: Vector Register Leakage-Active\n1890356 - CVE-2020-8698 hw: Fast forward store predictor\n1897684 - [rhel-7.9.z] Re-enable 06-5e-03 (SKL-H/S, CPUID 0x506e3) latest microcode updates\n1962650 - CVE-2020-24489 hw: vt-d related privilege escalation\n1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors\n1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security.  Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-0543\nhttps://access.redhat.com/security/cve/CVE-2020-0548\nhttps://access.redhat.com/security/cve/CVE-2020-0549\nhttps://access.redhat.com/security/cve/CVE-2020-8695\nhttps://access.redhat.com/security/cve/CVE-2020-8696\nhttps://access.redhat.com/security/cve/CVE-2020-8698\nhttps://access.redhat.com/security/cve/CVE-2020-24489\nhttps://access.redhat.com/security/cve/CVE-2020-24511\nhttps://access.redhat.com/security/cve/CVE-2020-24512\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is <secalert@redhat.com>. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nUjXnNBNse8A=LIYI\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. (CVE-2020-0548)\n\nIt was discovered that on some Intel processors, data from the most\nrecently evicted modified L1 data cache (L1D) line may be propagated into\nan unused (invalid) L1D fill buffer. =========================================================================\nUbuntu Security Notice USN-4393-1\nJune 10, 2020\n\nlinux vulnerabilities\n=========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 ESM\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. \n\nSoftware Description:\n- linux: Linux kernel\n\nDetails:\n\nIt was discovered that the Marvell WiFi-Ex Driver in the Linux kernel did\nnot properly validate status lengths in messages received from an access\npoint, leading to a buffer overflow. A physically proximate attacker\ncontrolling an access point could use this to construct messages that could\npossibly result in arbitrary code execution. (CVE-2020-12654)\n\nIt was discovered that memory contents previously stored in\nmicroarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY\nread operations on Intel client and Xeon E3 processors may be briefly\nexposed to processes on the same or different processor cores. A local\nattacker could use this to expose sensitive information. (CVE-2020-0543)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 ESM:\n  linux-image-3.2.0-147-generic   3.2.0-147.194\n  linux-image-3.2.0-147-generic-pae  3.2.0-147.194\n  linux-image-3.2.0-147-highbank  3.2.0-147.194\n  linux-image-3.2.0-147-powerpc-smp  3.2.0-147.194\n  linux-image-3.2.0-147-powerpc64-smp  3.2.0-147.194\n  linux-image-3.2.0-147-virtual   3.2.0-147.194\n  linux-image-generic             3.2.0.147.161\n  linux-image-generic-pae         3.2.0.147.161\n  linux-image-highbank            3.2.0.147.161\n  linux-image-powerpc             3.2.0.147.161\n  linux-image-powerpc-smp         3.2.0.147.161\n  linux-image-powerpc64-smp       3.2.0.147.161\n  linux-image-server              3.2.0.147.161\n  linux-image-virtual             3.2.0.147.161\n\nPlease note that the mitigation for CVE-2020-0543 requires a processor\nmicrocode update to be applied, either from your system manufacturer\nor via the intel-microcode package. The kernel update for this issue\nprovides the ability to disable the mitigation and to report\nvulnerability status. \n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-0543",
         },
         {
            db: "VULHUB",
            id: "VHN-161977",
         },
         {
            db: "VULMON",
            id: "CVE-2020-0543",
         },
         {
            db: "PACKETSTORM",
            id: "168851",
         },
         {
            db: "PACKETSTORM",
            id: "163956",
         },
         {
            db: "PACKETSTORM",
            id: "163757",
         },
         {
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            db: "PACKETSTORM",
            id: "158005",
         },
         {
            db: "PACKETSTORM",
            id: "158010",
         },
      ],
      trust: 1.71,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-0543",
            trust: 1.9,
         },
         {
            db: "MCAFEE",
            id: "SB10318",
            trust: 1.2,
         },
         {
            db: "OPENWALL",
            id: "OSS-SECURITY/2020/07/14/5",
            trust: 1.2,
         },
         {
            db: "SIEMENS",
            id: "SSA-534763",
            trust: 1.2,
         },
         {
            db: "PACKETSTORM",
            id: "158010",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "158005",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "157993",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158183",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158015",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "168421",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158198",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158189",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "157997",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158008",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158039",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158250",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158237",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158355",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158238",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158197",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "158190",
            trust: 0.1,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202006-630",
            trust: 0.1,
         },
         {
            db: "VULHUB",
            id: "VHN-161977",
            trust: 0.1,
         },
         {
            db: "ICS CERT",
            id: "ICSA-20-252-07",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2020-0543",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "168851",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "163956",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "163757",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "163758",
            trust: 0.1,
         },
         {
            db: "PACKETSTORM",
            id: "163772",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-161977",
         },
         {
            db: "VULMON",
            id: "CVE-2020-0543",
         },
         {
            db: "PACKETSTORM",
            id: "168851",
         },
         {
            db: "PACKETSTORM",
            id: "163956",
         },
         {
            db: "PACKETSTORM",
            id: "163757",
         },
         {
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            db: "PACKETSTORM",
            id: "158005",
         },
         {
            db: "PACKETSTORM",
            id: "158010",
         },
         {
            db: "NVD",
            id: "CVE-2020-0543",
         },
      ],
   },
   id: "VAR-202006-0241",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-161977",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-11-29T21:15:08.266000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "The Register",
            trust: 0.2,
            url: "https://www.theregister.co.uk/2020/06/09/june_2020_patch_tuesday/",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202707 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202680 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202706 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202677 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202432 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202771 - Security Advisory",
         },
         {
            title: "Ubuntu Security Notice: linux vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4393-1",
         },
         {
            title: "Ubuntu Security Notice: intel-microcode vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4385-1",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202433 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202758 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202431 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202842 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202757 - Security Advisory",
         },
         {
            title: "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202679 - Security Advisory",
         },
         {
            title: "Ubuntu Security Notice: intel-microcode regression",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4385-2",
         },
         {
            title: "Ubuntu Security Notice: linux, linux-lts-trusty vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4392-1",
         },
         {
            title: "Red Hat: Moderate: kernel security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202430 - Security Advisory",
         },
         {
            title: "Red Hat: Important: kernel security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202667 - Security Advisory",
         },
         {
            title: "Red Hat: Important: kernel security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202427 - Security Advisory",
         },
         {
            title: "Red Hat: Important: kernel-rt security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202428 - Security Advisory",
         },
         {
            title: "Ubuntu Security Notice: linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4390-1",
         },
         {
            title: "Ubuntu Security Notice: linux, linux-aws, linux-aws-5.3, linux-azure, linux-azure-5.3, linux-gcp, linux-gcp-5.3, linux-gke-5.3, linux-hwe, linux-kvm, linux-oracle, linux-oracle-5.3 vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4387-1",
         },
         {
            title: "Amazon Linux AMI: ALAS-2020-1396",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2020-1396",
         },
         {
            title: "Arch Linux Issues: ",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2020-0543 log",
         },
         {
            title: "Debian Security Advisories: DSA-4701-1 intel-microcode -- security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=954d2c33c2a4127c33b5f47731100050",
         },
         {
            title: "Red Hat: Important: kernel security, bug fix, and enhancement update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20203019 - Security Advisory",
         },
         {
            title: "Ubuntu Security Notice: linux-gke-5.0, linux-oem-osp1 vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4388-1",
         },
         {
            title: "Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oracle vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4389-1",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=90d5b24197f663c23e5af8c971118de6",
         },
         {
            title: "Arch Linux Advisories: [ASA-202006-11] intel-ucode: information disclosure",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories&qid=ASA-202006-11",
         },
         {
            title: "Ubuntu Security Notice: linux, linux-aws, linux-kvm vulnerabilities",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-4391-1",
         },
         {
            title: "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03668 rev. 4 - Intel® 2020.1 IPU Special Register Buffer Data Sampling and Improper Data Forwarding",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=85333ba63923f2976a4b451bcd61fd00",
         },
         {
            title: "Red Hat: Important: kernel security and bug fix update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20202429 - Security Advisory",
         },
         {
            title: "Citrix Security Bulletins: Citrix Hypervisor Security Updates",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins&qid=2b9d5984faab280f63afcb8a237cd1d2",
         },
         {
            title: "Amazon Linux 2: ALAS2-2020-1444",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2020-1444",
         },
         {
            title: "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03668 rev. 4 - Intel® 2020.1 IPU Special Register Buffer Data Sampling and Improper Data Forwarding",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=2a42c56bb55866dbb1c5a179d43a79fa",
         },
         {
            title: "Debian Security Advisories: DSA-4699-1 linux -- security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=24f2948c681d56f3f30c8ed6de9c4c9d",
         },
         {
            title: "Amazon Linux AMI: ALAS-2020-1401",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2020-1401",
         },
         {
            title: "Amazon Linux 2: ALAS2KERNEL-5.4-2022-012",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2KERNEL-5.4-2022-012",
         },
         {
            title: "Debian Security Advisories: DSA-4698-1 linux -- security update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=88a848047667226a68bbe6de9bb29095",
         },
         {
            title: "Speculative-execution-attacks",
            trust: 0.1,
            url: "https://github.com/Stefan-Radu/Speculative-execution-attacks ",
         },
         {
            title: "get-nist-details",
            trust: 0.1,
            url: "https://github.com/dmarcuccio-solace/get-nist-details ",
         },
         {
            title: "spectre-meltdown",
            trust: 0.1,
            url: "https://github.com/edsonjt81/spectre-meltdown ",
         },
         {
            title: "spectre-meltdown-checker",
            trust: 0.1,
            url: "https://github.com/speed47/spectre-meltdown-checker ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/merlinepedra25/spectre-meltdown-checker ",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/merlinepedra/spectre-meltdown-checker ",
         },
         {
            title: "hardware-attacks-state-of-the-art",
            trust: 0.1,
            url: "https://github.com/codexlynx/hardware-attacks-state-of-the-art ",
         },
         {
            title: "Threatpost",
            trust: 0.1,
            url: "https://threatpost.com/critical-intel-flaws-fixed-in-active-management-technology/156458/",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-0543",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-459",
            trust: 1.1,
         },
         {
            problemtype: "CWE-200",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-161977",
         },
         {
            db: "NVD",
            id: "CVE-2020-0543",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.3,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html",
         },
         {
            trust: 1.3,
            url: "https://usn.ubuntu.com/4393-1/",
         },
         {
            trust: 1.2,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf",
         },
         {
            trust: 1.2,
            url: "http://www.openwall.com/lists/oss-security/2020/07/14/5",
         },
         {
            trust: 1.2,
            url: "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html",
         },
         {
            trust: 1.2,
            url: "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html",
         },
         {
            trust: 1.2,
            url: "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html",
         },
         {
            trust: 1.2,
            url: "https://usn.ubuntu.com/4385-1/",
         },
         {
            trust: 1.2,
            url: "https://usn.ubuntu.com/4387-1/",
         },
         {
            trust: 1.2,
            url: "https://usn.ubuntu.com/4388-1/",
         },
         {
            trust: 1.2,
            url: "https://usn.ubuntu.com/4389-1/",
         },
         {
            trust: 1.2,
            url: "https://usn.ubuntu.com/4390-1/",
         },
         {
            trust: 1.2,
            url: "https://usn.ubuntu.com/4391-1/",
         },
         {
            trust: 1.2,
            url: "https://usn.ubuntu.com/4392-1/",
         },
         {
            trust: 1.1,
            url: "https://kc.mcafee.com/corporate/index?page=content&id=sb10318",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/nqzmoshltbbiecennxa6m7dn5feed4ki/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/grfc7uapkaffh5wx3amdubvhlkyqa2nz/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/dt2vkdmq3i37nbnj256a2exr7ojhxxkz/",
         },
         {
            trust: 1,
            url: "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/t5oum24zc43g4idt3jucihjtsdxjsk6y/",
         },
         {
            trust: 0.7,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-0543",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-0549",
         },
         {
            trust: 0.6,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-0548",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-8696",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-24511",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-8698",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-24512",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/articles/11258",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-24512",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-24489",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-24489",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-8698",
         },
         {
            trust: 0.4,
            url: "https://listman.redhat.com/mailman/listinfo/rhsa-announce",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-0543",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-8695",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/team/key/",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-8695",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/team/contact/",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-0549",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-8696",
         },
         {
            trust: 0.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-24511",
         },
         {
            trust: 0.4,
            url: "https://access.redhat.com/security/cve/cve-2020-0548",
         },
         {
            trust: 0.4,
            url: "https://bugzilla.redhat.com/):",
         },
         {
            trust: 0.2,
            url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/dt2vkdmq3i37nbnj256a2exr7ojhxxkz/",
         },
         {
            trust: 0.2,
            url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/grfc7uapkaffh5wx3amdubvhlkyqa2nz/",
         },
         {
            trust: 0.2,
            url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/nqzmoshltbbiecennxa6m7dn5feed4ki/",
         },
         {
            trust: 0.2,
            url: "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/t5oum24zc43g4idt3jucihjtsdxjsk6y/",
         },
         {
            trust: 0.2,
            url: "https://wiki.ubuntu.com/securityteam/knowledgebase/srbds",
         },
         {
            trust: 0.1,
            url: "https://kc.mcafee.com/corporate/index?page=content&amp;id=sb10318",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/459.html",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2020:2707",
         },
         {
            trust: 0.1,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-20-252-07",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://www.debian.org/security/faq",
         },
         {
            trust: 0.1,
            url: "https://www.debian.org/security/",
         },
         {
            trust: 0.1,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html",
         },
         {
            trust: 0.1,
            url: "https://security-tracker.debian.org/tracker/intel-microcode",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2021:3322",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2021:3027",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2021:3028",
         },
         {
            trust: 0.1,
            url: "https://access.redhat.com/errata/rhsa-2021:3029",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.20.04.0",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/4385-1",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.19.10.0",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.16.04.0",
         },
         {
            trust: 0.1,
            url: "https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.18.04.0",
         },
         {
            trust: 0.1,
            url: "https://usn.ubuntu.com/4393-1",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-12654",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-161977",
         },
         {
            db: "VULMON",
            id: "CVE-2020-0543",
         },
         {
            db: "PACKETSTORM",
            id: "168851",
         },
         {
            db: "PACKETSTORM",
            id: "163956",
         },
         {
            db: "PACKETSTORM",
            id: "163757",
         },
         {
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            db: "PACKETSTORM",
            id: "158005",
         },
         {
            db: "PACKETSTORM",
            id: "158010",
         },
         {
            db: "NVD",
            id: "CVE-2020-0543",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-161977",
         },
         {
            db: "VULMON",
            id: "CVE-2020-0543",
         },
         {
            db: "PACKETSTORM",
            id: "168851",
         },
         {
            db: "PACKETSTORM",
            id: "163956",
         },
         {
            db: "PACKETSTORM",
            id: "163757",
         },
         {
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            db: "PACKETSTORM",
            id: "158005",
         },
         {
            db: "PACKETSTORM",
            id: "158010",
         },
         {
            db: "NVD",
            id: "CVE-2020-0543",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-06-15T00:00:00",
            db: "VULHUB",
            id: "VHN-161977",
         },
         {
            date: "2020-06-15T00:00:00",
            db: "VULMON",
            id: "CVE-2020-0543",
         },
         {
            date: "2020-06-28T19:12:00",
            db: "PACKETSTORM",
            id: "168851",
         },
         {
            date: "2021-08-31T15:44:21",
            db: "PACKETSTORM",
            id: "163956",
         },
         {
            date: "2021-08-09T14:15:37",
            db: "PACKETSTORM",
            id: "163757",
         },
         {
            date: "2021-08-09T14:15:45",
            db: "PACKETSTORM",
            id: "163758",
         },
         {
            date: "2021-08-10T14:49:53",
            db: "PACKETSTORM",
            id: "163772",
         },
         {
            date: "2020-06-10T15:06:11",
            db: "PACKETSTORM",
            id: "158005",
         },
         {
            date: "2020-06-10T15:08:12",
            db: "PACKETSTORM",
            id: "158010",
         },
         {
            date: "2020-06-15T14:15:11.207000",
            db: "NVD",
            id: "CVE-2020-0543",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-28T00:00:00",
            db: "VULHUB",
            id: "VHN-161977",
         },
         {
            date: "2022-04-28T00:00:00",
            db: "VULMON",
            id: "CVE-2020-0543",
         },
         {
            date: "2024-11-21T04:53:42.440000",
            db: "NVD",
            id: "CVE-2020-0543",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "PACKETSTORM",
            id: "158005",
         },
         {
            db: "PACKETSTORM",
            id: "158010",
         },
      ],
      trust: 0.2,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Debian Security Advisory 4701-1",
      sources: [
         {
            db: "PACKETSTORM",
            id: "168851",
         },
      ],
      trust: 0.1,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "overflow, arbitrary, code execution",
      sources: [
         {
            db: "PACKETSTORM",
            id: "158010",
         },
      ],
      trust: 0.1,
   },
}

var-202106-0341
Vulnerability from variot

Improper initialization in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, 13.50.11 and 15.0.22 may allow a privileged user to potentially enable information disclosure via local access. Intel(R) CSME Contains an initialization vulnerability.Information may be obtained. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0341",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "13.0.47",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "13.30.17",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "14.1.53",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "14.5.32",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "12.0.81",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.12.86",
         },
         {
            model: "simatic ipc477e pro",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc647e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "13.50.11",
         },
         {
            model: "simatic ipc847e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.8.86",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "15.0.22",
         },
         {
            model: "simatic ipc677e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic ipc547g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc627e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.22.86",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc527g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "13.30.17",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "11.12.86",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "14.1.53",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "11.8.86",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "14.5.32",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "13.0.47",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "15.0.22",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: null,
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "13.50.11",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "11.22.86",
         },
         {
            model: "intel converged security and manageability engine",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "12.0.81",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            db: "NVD",
            id: "CVE-2020-24507",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "12.0.81",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b360:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b365:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h310:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h370:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:mobile_cm246:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q370:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z390:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "12.0.81",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b360:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b365:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h310:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h370:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:mobile_cm246:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q370:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z390:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "13.0.47",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.0.47",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "13.30.17",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3_l13g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5_l16g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.30.17",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3_l13g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5_l16g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "14.1.53",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "14.1.53",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "14.5.32",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "14.5.32",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "11.8.86",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b150:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:b250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_m3-7y32:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h110:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h170:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:h270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q150:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q170:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:q270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z170:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "11.8.86",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b150:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:b250:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m3-7y32:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h110:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h170:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:h270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q150:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q170:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q250:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:q270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z170:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "11.12.86",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c420:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "11.12.86",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c420:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "11.22.86",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c621a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "11.22.86",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c621a:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "13.50.11",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n4000c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n4020c:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n5095:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_silver_a1030:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "13.50.11",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n4000c:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n4020c:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n5095:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_silver_a1030:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "15.0.22",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-11100b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11500b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900kb:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "15.0.22",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-11100b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11500b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900kb:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-24507",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens reported these vulnerabilities to CISA.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-560",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2020-24507",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULMON",
                  availabilityImpact: "NONE",
                  baseScore: 2.1,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "CVE-2020-24507",
                  impactScore: 2.9,
                  integrityImpact: "NONE",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "LOW",
                  trust: 1.9,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:N/A:N",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "NONE",
                  baseScore: 4.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.8,
                  id: "CVE-2020-24507",
                  impactScore: 3.6,
                  integrityImpact: "NONE",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "None",
                  baseScore: 4.4,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-24507",
                  impactScore: null,
                  integrityImpact: "None",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-24507",
                  trust: 1.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202106-560",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-24507",
                  trust: 0.1,
                  value: "LOW",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-24507",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-560",
         },
         {
            db: "NVD",
            id: "CVE-2020-24507",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Improper initialization in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, 13.50.11 and 15.0.22 may allow a privileged user to potentially enable information disclosure via local access. Intel(R) CSME Contains an initialization vulnerability.Information may be obtained. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-24507",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2020-24507",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-24507",
            trust: 3.3,
         },
         {
            db: "SIEMENS",
            id: "SSA-309571",
            trust: 1.7,
         },
         {
            db: "JVN",
            id: "JVNVU99965981",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.1997",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021081109",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021061712",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-222-05",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-51731",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-560",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2020-24507",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-24507",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-560",
         },
         {
            db: "NVD",
            id: "CVE-2020-24507",
         },
      ],
   },
   id: "VAR-202106-0341",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5185185333333333,
   },
   last_update_date: "2022-05-04T08:07:35.391000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INTEL-SA-00459",
            trust: 0.8,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html",
         },
         {
            title: "Intel(R) CSME Repair measures for information disclosure vulnerabilities",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=155255",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=240e27e5c8fba28153598a375a2a4130",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-24507",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-560",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-665",
            trust: 1,
         },
         {
            problemtype: "Improper initialization (CWE-665) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            db: "NVD",
            id: "CVE-2020-24507",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html",
         },
         {
            trust: 1.7,
            url: "https://security.netapp.com/advisory/ntap-20210611-0004/",
         },
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu99965981/",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-24507",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021081109",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-51731",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/intel-processor-multiple-vulnerabilities-via-csme-sps-lms-35670",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021061712",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.1997",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-222-05",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/665.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://cert-portal.siemens.com/productcert/txt/ssa-309571.txt",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-24507",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-560",
         },
         {
            db: "NVD",
            id: "CVE-2020-24507",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2020-24507",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-560",
         },
         {
            db: "NVD",
            id: "CVE-2020-24507",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-06-09T00:00:00",
            db: "VULMON",
            id: "CVE-2020-24507",
         },
         {
            date: "2022-03-18T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-06-08T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-560",
         },
         {
            date: "2021-06-09T19:15:00",
            db: "NVD",
            id: "CVE-2020-24507",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-08-10T00:00:00",
            db: "VULMON",
            id: "CVE-2020-24507",
         },
         {
            date: "2022-03-18T07:28:00",
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2022-04-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-560",
         },
         {
            date: "2022-04-22T16:20:00",
            db: "NVD",
            id: "CVE-2020-24507",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-560",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Intel(R) CSME  Initialization vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008543",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
}

var-202106-0697
Vulnerability from variot

Race condition in a subsystem in the Intel(R) LMS versions before 2039.1.0.0 may allow a privileged user to potentially enable escalation of privilege via local access. Intel(R) LMS Is vulnerable to a race condition.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0697",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic ipc477e pro",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc647e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic ipc547g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc677e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc527g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc627e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "local manageability service",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "2039.1.0.0",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc847e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "intel local manageability service",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: null,
         },
         {
            model: "intel local manageability service",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "2039.1.0.0",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            db: "NVD",
            id: "CVE-2020-8704",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens reported these vulnerabilities to CISA.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-562",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2020-8704",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.4,
                  id: "CVE-2020-8704",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.9,
                  vectorString: "AV:L/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "MEDIUM",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.4,
                  id: "VHN-186829",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:L/AC:M/AU:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  author: "nvd@nist.gov",
                  availabilityImpact: "HIGH",
                  baseScore: 6.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.5,
                  id: "CVE-2020-8704",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "High",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 6.4,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-8704",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2020-8704",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2020-8704",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202106-562",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-186829",
                  trust: 0.1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-8704",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186829",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8704",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-562",
         },
         {
            db: "NVD",
            id: "CVE-2020-8704",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Race condition in a subsystem in the Intel(R) LMS versions before 2039.1.0.0 may allow a privileged user to potentially enable escalation of privilege via local access. Intel(R) LMS Is vulnerable to a race condition.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-8704",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULHUB",
            id: "VHN-186829",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8704",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-8704",
            trust: 3.4,
         },
         {
            db: "SIEMENS",
            id: "SSA-309571",
            trust: 1.8,
         },
         {
            db: "JVN",
            id: "JVNVU99965981",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.1997",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021081109",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021061712",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-222-05",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-51731",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-562",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-186829",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2020-8704",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186829",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8704",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-562",
         },
         {
            db: "NVD",
            id: "CVE-2020-8704",
         },
      ],
   },
   id: "VAR-202106-0697",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186829",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-08-14T12:15:31.214000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INTEL-SA-00459",
            trust: 0.8,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html",
         },
         {
            title: "Intel(R) LMS Repair measures for the competition condition problem loophole",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=155256",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=240e27e5c8fba28153598a375a2a4130",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8704",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-562",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-362",
            trust: 1.1,
         },
         {
            problemtype: "Race condition (CWE-362) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186829",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            db: "NVD",
            id: "CVE-2020-8704",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.8,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu99965981/",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-8704",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021081109",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-51731",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/intel-processor-multiple-vulnerabilities-via-csme-sps-lms-35670",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021061712",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.1997",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-222-05",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/362.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://cert-portal.siemens.com/productcert/txt/ssa-309571.txt",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186829",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8704",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-562",
         },
         {
            db: "NVD",
            id: "CVE-2020-8704",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-186829",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8704",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-562",
         },
         {
            db: "NVD",
            id: "CVE-2020-8704",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-06-09T00:00:00",
            db: "VULHUB",
            id: "VHN-186829",
         },
         {
            date: "2021-06-09T00:00:00",
            db: "VULMON",
            id: "CVE-2020-8704",
         },
         {
            date: "2022-03-18T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-06-08T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-562",
         },
         {
            date: "2021-06-09T19:15:09.263000",
            db: "NVD",
            id: "CVE-2020-8704",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-22T00:00:00",
            db: "VULHUB",
            id: "VHN-186829",
         },
         {
            date: "2021-08-10T00:00:00",
            db: "VULMON",
            id: "CVE-2020-8704",
         },
         {
            date: "2022-03-18T07:14:00",
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2022-04-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-562",
         },
         {
            date: "2022-04-22T16:20:40.843000",
            db: "NVD",
            id: "CVE-2020-8704",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-562",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Intel(R) LMS  Race Vulnerability in",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008542",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
}

var-202202-0108
Vulnerability from variot

An issue was discovered in AhciBusDxe in the kernel 5.0 through 5.5 in Insyde InsydeH2O. Because of an Untrusted Pointer Dereference that causes SMM memory corruption, an attacker may be able to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count

SMM Privilege Escalation 10

SMM Memory Corruption 12

DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. Insyde InsydeH2O Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0108",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.2",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.08.41",
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc627e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.0",
         },
         {
            model: "simatic ipc677e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc847e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.35.41",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.4",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc227g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.16.41",
         },
         {
            model: "simatic ipc327g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc127e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.1",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.43.41",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.3",
         },
         {
            model: "simatic ipc277g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.26.41",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc377g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc647e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.5",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.51.41",
         },
         {
            model: "insydeh2o",
            scope: null,
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
         {
            db: "NVD",
            id: "CVE-2021-41837",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.08.41",
                        versionStartIncluding: "5.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.16.41",
                        versionStartIncluding: "5.1",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.26.41",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.35.41",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.43.41",
                        versionStartIncluding: "5.4",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.51.41",
                        versionStartIncluding: "5.5",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc227g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc277g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc327g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc377g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41837",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This document was written by Vijay Sarvepalli.Statement Date:   March 01, 2022",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2021-41837",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.2,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2021-41837",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 8.2,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.5,
                  impactScore: 6,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 8.2,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-41837",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Changed",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-41837",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202202-113",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
         {
            db: "NVD",
            id: "CVE-2021-41837",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-113",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "An issue was discovered in AhciBusDxe in the kernel 5.0 through 5.5 in Insyde InsydeH2O. Because of an Untrusted Pointer Dereference that causes SMM memory corruption, an attacker may be able to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count \n\n\n\n\nSMM Privilege Escalation 10 \n\n\n SMM Memory Corruption  12 \n\n\n DXE Memory Corruption 1CVE-2020-27339 Affected\nCVE-2020-5953 Affected\nCVE-2021-33625 Affected\nCVE-2021-33626 Affected\nCVE-2021-33627 Affected\nCVE-2021-41837 Affected\nCVE-2021-41838 Affected\nCVE-2021-41839 Affected\nCVE-2021-41840 Affected\nCVE-2021-41841 Affected\nCVE-2021-42059 Affected\nCVE-2021-42060 Not Affected\nCVE-2021-42113 Affected\nCVE-2021-42554 Affected\nCVE-2021-43323 Affected\nCVE-2021-43522 Affected\nCVE-2021-43615 Not Affected\nCVE-2021-45969 Not Affected\nCVE-2021-45970 Not Affected\nCVE-2021-45971 Not Affected\nCVE-2022-24030 Not Affected\nCVE-2022-24031 Not Affected\nCVE-2022-24069 Not Affected\nCVE-2022-28806 Unknown. Insyde InsydeH2O Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41837",
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-41837",
            trust: 4,
         },
         {
            db: "SIEMENS",
            id: "SSA-306654",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97136454",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001345",
            trust: 0.8,
         },
         {
            db: "LENOVO",
            id: "LEN-73436",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2022020314",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-113",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
         {
            db: "NVD",
            id: "CVE-2021-41837",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-113",
         },
      ],
   },
   id: "VAR-202202-0108",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2023-12-18T11:25:14.275000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Insyde's Security Pledge Security Advisory",
            trust: 0.8,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            title: "Insyde InsydeH2O Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=181526",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-113",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1,
         },
         {
            problemtype: "Buffer error (CWE-119) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
         {
            db: "NVD",
            id: "CVE-2021-41837",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
         },
         {
            trust: 1.6,
            url: "https://security.netapp.com/advisory/ntap-20220222-0003/",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge/sa-2022024",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-41837",
         },
         {
            trust: 0.8,
            url: "cve-2020-27339  ",
         },
         {
            trust: 0.8,
            url: "cve-2020-5953  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33625  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33626  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33627  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41837  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41838  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41839  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41840  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41841  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42059  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42060  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42113  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42554  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43323  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43522  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43615  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45969  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45970  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45971  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24030  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24031  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24069  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-28806  ",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu97136454/index.html",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/independent-bios-developers-multiple-vulnerabilities-via-uefi-37438",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022020314",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-73436",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
         {
            db: "NVD",
            id: "CVE-2021-41837",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-113",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
         {
            db: "NVD",
            id: "CVE-2021-41837",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-113",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-01T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
         {
            date: "2022-02-03T02:15:07.033000",
            db: "NVD",
            id: "CVE-2021-41837",
         },
         {
            date: "2022-02-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-113",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-28T07:09:00",
            db: "JVNDB",
            id: "JVNDB-2022-001345",
         },
         {
            date: "2022-03-01T19:43:28.793000",
            db: "NVD",
            id: "CVE-2021-41837",
         },
         {
            date: "2022-03-10T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-113",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-113",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-113",
         },
      ],
      trust: 0.6,
   },
}

var-202202-0147
Vulnerability from variot

An issue was discovered in Insyde InsydeH2O with Kernel 5.0 before 05.08.42, Kernel 5.1 before 05.16.42, Kernel 5.2 before 05.26.42, Kernel 5.3 before 05.35.42, Kernel 5.4 before 05.42.51, and Kernel 5.5 before 05.50.51. An SMM memory corruption vulnerability in FvbServicesRuntimeDxe allows a possible attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count

SMM Privilege Escalation 10

SMM Memory Corruption 12

DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. Insyde InsydeH2O Kernel Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0147",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.2",
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc627e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.0",
         },
         {
            model: "simatic ipc677e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc847e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.4",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc227g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc327g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "ruggedcom ape1808",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc127e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.1",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.3",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.08.42",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.35.42",
         },
         {
            model: "simatic ipc277g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc377g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.26.42",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.16.42",
         },
         {
            model: "simatic ipc647e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.50.51",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.42.51",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.5",
         },
         {
            model: "insydeh2o",
            scope: null,
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
         {
            db: "NVD",
            id: "CVE-2021-42554",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.08.42",
                        versionStartIncluding: "5.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.16.42",
                        versionStartIncluding: "5.1",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.26.42",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.35.42",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.42.51",
                        versionStartIncluding: "5.4",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.50.51",
                        versionStartIncluding: "5.5",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc227g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc277g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc327g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc377g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:ruggedcom_ape1808_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:ruggedcom_ape1808:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-42554",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This document was written by Vijay Sarvepalli.Statement Date:   March 01, 2022",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2021-42554",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 10,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2021-42554",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 8.2,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.5,
                  impactScore: 6,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Network",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 9.8,
                  baseSeverity: "Critical",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-42554",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-42554",
                  trust: 1,
                  value: "HIGH",
               },
               {
                  author: "NVD",
                  id: "CVE-2021-42554",
                  trust: 0.8,
                  value: "Critical",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202202-107",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
         {
            db: "NVD",
            id: "CVE-2021-42554",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-107",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "An issue was discovered in Insyde InsydeH2O with Kernel 5.0 before 05.08.42, Kernel 5.1 before 05.16.42, Kernel 5.2 before 05.26.42, Kernel 5.3 before 05.35.42, Kernel 5.4 before 05.42.51, and Kernel 5.5 before 05.50.51. An SMM memory corruption vulnerability in FvbServicesRuntimeDxe allows a possible attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count \n\n\n\n\nSMM Privilege Escalation 10 \n\n\n SMM Memory Corruption  12 \n\n\n DXE Memory Corruption 1CVE-2020-27339 Affected\nCVE-2020-5953 Affected\nCVE-2021-33625 Affected\nCVE-2021-33626 Affected\nCVE-2021-33627 Affected\nCVE-2021-41837 Affected\nCVE-2021-41838 Affected\nCVE-2021-41839 Affected\nCVE-2021-41840 Affected\nCVE-2021-41841 Affected\nCVE-2021-42059 Affected\nCVE-2021-42060 Not Affected\nCVE-2021-42113 Affected\nCVE-2021-42554 Affected\nCVE-2021-43323 Affected\nCVE-2021-43522 Affected\nCVE-2021-43615 Not Affected\nCVE-2021-45969 Not Affected\nCVE-2021-45970 Not Affected\nCVE-2021-45971 Not Affected\nCVE-2022-24030 Not Affected\nCVE-2022-24031 Not Affected\nCVE-2022-24069 Not Affected\nCVE-2022-28806 Unknown. Insyde InsydeH2O Kernel Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-42554",
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-42554",
            trust: 4,
         },
         {
            db: "SIEMENS",
            id: "SSA-306654",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97136454",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001353",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2022020318",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-73436",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-107",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
         {
            db: "NVD",
            id: "CVE-2021-42554",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-107",
         },
      ],
   },
   id: "VAR-202202-0147",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2023-12-18T11:07:31.315000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Insyde's Security Pledge Security Advisory",
            trust: 0.8,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            title: "Insyde InsydeH2O Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=185270",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-107",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
         {
            db: "NVD",
            id: "CVE-2021-42554",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
         },
         {
            trust: 1.6,
            url: "https://security.netapp.com/advisory/ntap-20220216-0007/",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge/sa-2022012",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-42554",
         },
         {
            trust: 0.8,
            url: "cve-2020-27339  ",
         },
         {
            trust: 0.8,
            url: "cve-2020-5953  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33625  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33626  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33627  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41837  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41838  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41839  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41840  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41841  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42059  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42060  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42113  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42554  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43323  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43522  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43615  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45969  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45970  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45971  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24030  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24031  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24069  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-28806  ",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu97136454/index.html",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/independent-bios-developers-multiple-vulnerabilities-via-uefi-37438",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022020318",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-73436",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
         {
            db: "NVD",
            id: "CVE-2021-42554",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-107",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
         {
            db: "NVD",
            id: "CVE-2021-42554",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-107",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-01T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
         {
            date: "2022-02-03T02:15:07.380000",
            db: "NVD",
            id: "CVE-2021-42554",
         },
         {
            date: "2022-02-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-107",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-28T07:08:00",
            db: "JVNDB",
            id: "JVNDB-2022-001353",
         },
         {
            date: "2022-03-08T20:18:59.047000",
            db: "NVD",
            id: "CVE-2021-42554",
         },
         {
            date: "2022-03-09T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-107",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-107",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-107",
         },
      ],
      trust: 0.6,
   },
}

var-202011-1387
Vulnerability from variot

Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. Intel(R) CSME and TXE Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1387",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.22.80",
         },
         {
            model: "simatic ipc427e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "27.01.05",
         },
         {
            model: "simatic et200sp 1515sp pc2",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "0209.0105",
         },
         {
            model: "sinumerik 840d sl ht 10",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "sinumerik 828d hw pu.4",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "08.00.00.00",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "14.0.45",
         },
         {
            model: "simatic ipc527g",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1.4.0",
         },
         {
            model: "simatic ipc627e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "simatic ipc847e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "simatic ipc647e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "simatic ipc667e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "converged security and manageability engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "12.0",
         },
         {
            model: "simatic ipc127e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "27.01.05",
         },
         {
            model: "simatic itp1000",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "23.01.08",
         },
         {
            model: "simatic drive controller",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "05.00.01.00",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.8.80",
         },
         {
            model: "converged security and manageability engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "14.5.0",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "14.5.25",
         },
         {
            model: "sinumerik mc mcu 1720",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "05.00.00.00",
         },
         {
            model: "sinumerik one",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "sinumerik one ncu 1740",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "04.00.00.00",
         },
         {
            model: "trusted execution technology",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "4.0.30",
         },
         {
            model: "trusted execution technology",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "4.0",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: null,
         },
         {
            model: "converged security and manageability engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "14.0",
         },
         {
            model: "sinumerik one ppu 1740",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "06.00.00.00",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "11.12.80",
         },
         {
            model: "simatic ipc477e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "27.01.05",
         },
         {
            model: "simatic ipc547g",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "r1.30.0",
         },
         {
            model: "simatic field pg m5",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "22.01.08",
         },
         {
            model: "converged security and manageability engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "11.22.0",
         },
         {
            model: "trusted execution technology",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "3.1.80",
         },
         {
            model: "converged security and manageability engine",
            scope: "lt",
            trust: 1,
            vendor: "intel",
            version: "12.0.70",
         },
         {
            model: "converged security and manageability engine",
            scope: "gte",
            trust: 1,
            vendor: "intel",
            version: "11.12.0",
         },
         {
            model: "trusted execution technology",
            scope: null,
            trust: 0.8,
            vendor: "インテル",
            version: null,
         },
         {
            model: "intel csme",
            scope: null,
            trust: 0.8,
            vendor: "インテル",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            db: "NVD",
            id: "CVE-2020-8745",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemen reported these vulnerabilities to CISA.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201911-1653",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2020-8745",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "nvd@nist.gov",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.6,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "CVE-2020-8745",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 1.9,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.6,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "VHN-186870",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  severity: "MEDIUM",
                  trust: 0.1,
                  vectorString: "AV:L/AC:L/AU:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "PHYSICAL",
                  author: "nvd@nist.gov",
                  availabilityImpact: "HIGH",
                  baseScore: 6.8,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.9,
                  id: "CVE-2020-8745",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Physical",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 6.8,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-8745",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "None",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "nvd@nist.gov",
                  id: "CVE-2020-8745",
                  trust: 1,
                  value: "MEDIUM",
               },
               {
                  author: "NVD",
                  id: "CVE-2020-8745",
                  trust: 0.8,
                  value: "Medium",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201911-1653",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULHUB",
                  id: "VHN-186870",
                  trust: 0.1,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-8745",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186870",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8745",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1653",
         },
         {
            db: "NVD",
            id: "CVE-2020-8745",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access. Intel(R) CSME and TXE Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-8745",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            db: "VULHUB",
            id: "VHN-186870",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8745",
         },
      ],
      trust: 1.8,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-8745",
            trust: 2.6,
         },
         {
            db: "SIEMENS",
            id: "SSA-678983",
            trust: 1.8,
         },
         {
            db: "JVN",
            id: "JVNVU91051134",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
            trust: 0.8,
         },
         {
            db: "ICS CERT",
            id: "ICSA-22-132-05",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.3958.2",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.3958",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2022.2355",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-39432",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1653",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-186870",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2020-8745",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186870",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8745",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1653",
         },
         {
            db: "NVD",
            id: "CVE-2020-8745",
         },
      ],
   },
   id: "VAR-202011-1387",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186870",
         },
      ],
      trust: 0.77708335,
   },
   last_update_date: "2024-11-23T21:18:20.183000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INTEL-SA-00391",
            trust: 0.8,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391.html",
         },
         {
            title: "Intel TXE Security vulnerabilities",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqById.tag?id=134975",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=0bfef52a44075162940391ee650c313e",
         },
         {
            title: "HP: HPSBHF03703 rev. 1  -  Intel® 2020.2 IPU - CSME, SPS, TXE, AMT, and DAL Security Update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=HPSBHF03703",
         },
         {
            title: "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03703 rev. 4  -  Intel® 2020.2 IPU - CSME, SPS, TXE, AMT, and DAL Security Update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=c2cb4814b580012b6267520bd227e8ae",
         },
         {
            title: "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03703 rev. 4  -  Intel® 2020.2 IPU - CSME, SPS, TXE, AMT, and DAL Security Update",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=f5eb680d1c7e445b4a8fdf769d4117b0",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8745",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1653",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-noinfo",
            trust: 1,
         },
         {
            problemtype: "Improper authority management (CWE-269) [NVD Evaluation ]",
            trust: 0.8,
         },
         {
            problemtype: "CWE-269",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186870",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            db: "NVD",
            id: "CVE-2020-8745",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.8,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf",
         },
         {
            trust: 1.8,
            url: "https://security.netapp.com/advisory/ntap-20201113-0002/",
         },
         {
            trust: 1.8,
            url: "https://security.netapp.com/advisory/ntap-20201113-0005/",
         },
         {
            trust: 1.8,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-8745",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu91051134/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.3958/",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-22-132-05",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.3958.2/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2022.2355",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-39432",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/intel-processors-multiple-vulnerabilities-via-csme-sps-txe-amt-dal-33887",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-05",
         },
         {
            trust: 0.1,
            url: "https://support.hp.com/us-en/document/c06962103",
         },
      ],
      sources: [
         {
            db: "VULHUB",
            id: "VHN-186870",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8745",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1653",
         },
         {
            db: "NVD",
            id: "CVE-2020-8745",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULHUB",
            id: "VHN-186870",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8745",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1653",
         },
         {
            db: "NVD",
            id: "CVE-2020-8745",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-11-12T00:00:00",
            db: "VULHUB",
            id: "VHN-186870",
         },
         {
            date: "2020-11-12T00:00:00",
            db: "VULMON",
            id: "CVE-2020-8745",
         },
         {
            date: "2021-07-02T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            date: "2019-11-10T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201911-1653",
         },
         {
            date: "2020-11-12T18:15:17.300000",
            db: "NVD",
            id: "CVE-2020-8745",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-10-14T00:00:00",
            db: "VULHUB",
            id: "VHN-186870",
         },
         {
            date: "2021-07-21T00:00:00",
            db: "VULMON",
            id: "CVE-2020-8745",
         },
         {
            date: "2021-07-02T04:36:00",
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
         {
            date: "2022-10-17T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201911-1653",
         },
         {
            date: "2024-11-21T05:39:22.207000",
            db: "NVD",
            id: "CVE-2020-8745",
         },
      ],
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Intel(R) CSME  and  TXE  Vulnerability in privilege management",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-013418",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201911-1653",
         },
      ],
      trust: 0.6,
   },
}

var-202011-0064
Vulnerability from variot

Improper input validation in BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access. plural Intel(R) Processor of BIOS There is an input verification vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202011-0064",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "xeon platinum 8253",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 5119t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6256",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6128",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 9242",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6230t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 9221",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 8280",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver 4214",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6144",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 5220s",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 8156",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6238",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 5115",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 8180",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6240r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc847e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "xeon platinum 8176",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6238r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6252",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 5220t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6246",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6138p",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon bronze 3206r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver 4116",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6254",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver 4116t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 8276",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon bronze 3104",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver 4214r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6252n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6262v",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver 4215",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver 4210t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 5120",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver 4112",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6209u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 8153",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 8168",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 8276l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver 4114",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6138f",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6136",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 8160t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6138t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6208u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6240l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 9282",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver 4210",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6140",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 5215l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6246r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver 4209t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6154",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6242r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon bronze 3204",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc677e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "xeon gold 5215",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 8160f",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 5220r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 5120t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6150",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 8164",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6148",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6210u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6130",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver 4110",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6152",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6242",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 5122",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "clustered data ontap",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "xeon gold 6226r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 8160",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver 4210r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6238l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 8260l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6230",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc527g",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "1.4.0",
         },
         {
            model: "xeon silver 4208",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 9222",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6248",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "cloud backup",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "xeon gold 6226",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 8280l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6234",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 8170",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6212u",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6230n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc547g",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "r1.30.0",
         },
         {
            model: "xeon gold 6244",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 5118",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6142f",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver 4214y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6132",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6240",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver 4114t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 5218t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6126",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6258r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6134",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 5218r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6130f",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6230r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 5222",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6130t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 5220",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6142",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc647e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "xeon platinum 8270",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6126t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon bronze 3106",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 8260",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6138",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 8176f",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6250l",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6148f",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc627e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.08",
         },
         {
            model: "xeon gold 5217",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 5218",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver 4215r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 8158",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6222v",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6240y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6238t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 5218n",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 8268",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6146",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver 4109t",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver 4216",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6126f",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "fas\\/aff bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "xeon platinum 8260y",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon platinum 8256",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon silver 4108",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 5218b",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6250",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "xeon gold 6248r",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "bios",
            scope: null,
            trust: 0.8,
            vendor: "インテル",
            version: null,
         },
         {
            model: "日立アドバンストサーバ",
            scope: null,
            trust: 0.8,
            vendor: "日立",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-013188",
         },
         {
            db: "NVD",
            id: "CVE-2020-0590",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_bronze_3206r_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_bronze_3206r_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5218r_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5218r_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5220r_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5220r_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6208u_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6208u_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6226r_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6226r_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6230r_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6230r_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6238r_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6238r_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6240r_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6240r_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6242r_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6242r_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6246r_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6246r_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6248r_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6248r_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6250_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6250_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6250l_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6250l_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6256_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6256_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6258r_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6258r_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4210r_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4210r_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4210t_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4210t_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4214r_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4214r_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4215r_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4215r_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_9221_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_9221_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_9222_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_9222_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6209u_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6209u_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6210u_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6210u_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6212u_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6212u_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6230n_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6230n_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6230t_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6230t_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6234_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6234_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6138p_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6138p_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_bronze_3104_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_bronze_3106_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5115_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5115_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5118_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5118_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5119t_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5119t_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5120_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5120_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5120t_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5120t_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5122_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_5122_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6126_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6126_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6126f_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6126f_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6126t_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6126t_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6128_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6128_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6130_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6130_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6130f_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6130f_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6130t_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6130t_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6132_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6132_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6134_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6134_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6136_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6136_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6138_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6138_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6138f_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6138f_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6138t_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6138t_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6140_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6140_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6142_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6142_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6142f_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6142f_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6144_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6144_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6146_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6146_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6148_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6148_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6148f_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6148f_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6150_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6150_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6152_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6152_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6154_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_gold_6154_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8153_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8153_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8156_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8156_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8158_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8158_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8160_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8160_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8160f_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8160f_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8160t_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8160t_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8164_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8164_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8168_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8168_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8170_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8170_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8176_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8176_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8176f_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8176f_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8180_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_platinum_8180_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4108_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4108_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4109t_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4109t_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4110_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4110_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4112_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4112_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4114_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4114_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4114t_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4114t_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4116_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4116_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4116t_firmware:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:xeon_silver_4116t_firmware:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:fas\\/aff_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "1.4.0",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "1.4.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "r1.30.0",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "r1.30.0",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.08",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.08",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.08",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.08",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.08",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.08",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.08",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.08",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-0590",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemen reported these vulnerabilities to CISA.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201911-1686",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2020-0590",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.6,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.9,
                  id: "CVE-2020-0590",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1.9,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 7.8,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.8,
                  id: "CVE-2020-0590",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 7.8,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-0590",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "Low",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-0590",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-201911-1686",
                  trust: 0.6,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-0590",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-0590",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013188",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1686",
         },
         {
            db: "NVD",
            id: "CVE-2020-0590",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Improper input validation in BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access. plural Intel(R) Processor of BIOS There is an input verification vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-0590",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013188",
         },
         {
            db: "VULMON",
            id: "CVE-2020-0590",
         },
      ],
      trust: 1.71,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-0590",
            trust: 2.5,
         },
         {
            db: "SIEMENS",
            id: "SSA-678983",
            trust: 1.7,
         },
         {
            db: "JVN",
            id: "JVNVU91051134",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013188",
            trust: 0.8,
         },
         {
            db: "ICS CERT",
            id: "ICSA-22-132-05",
            trust: 0.7,
         },
         {
            db: "AUSCERT",
            id: "ESB-2022.2355",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2020.3949",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-49266",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1686",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2020-0590",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-0590",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013188",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1686",
         },
         {
            db: "NVD",
            id: "CVE-2020-0590",
         },
      ],
   },
   id: "VAR-202011-0064",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2023-01-02T22:26:00.072000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INTEL-SA-00358 Hitachi Server / Client Product Security Information",
            trust: 0.8,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00358.html",
         },
         {
            title: "Intel Processors Enter the fix for the verification error vulnerability",
            trust: 0.6,
            url: "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=134603",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=0bfef52a44075162940391ee650c313e",
         },
         {
            title: "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03705 rev. 6 - BIOS November 2020 Security Updates",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=892287da75187b64a9430d6c2f52fb94",
         },
         {
            title: "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03705 rev. 6 - BIOS November 2020 Security Updates",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=f872c139829b190dd155b5676016edf1",
         },
         {
            title: "HP: HPSBHF03705 rev. 1 - BIOS November 2020 Security Updates",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin&qid=hpsbhf03705",
         },
         {
            title: "",
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2020-0590 ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-0590",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013188",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1686",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-20",
            trust: 1,
         },
         {
            problemtype: "Incorrect input confirmation (CWE-20) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-013188",
         },
         {
            db: "NVD",
            id: "CVE-2020-0590",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00358",
         },
         {
            trust: 1.7,
            url: "https://security.netapp.com/advisory/ntap-20201113-0001/",
         },
         {
            trust: 1.7,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-0590",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu91051134/",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-49266",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-22-132-05",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/intel-processors-multiple-vulnerabilities-via-bios-33888",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2020.3949/",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2022.2355",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/20.html",
         },
         {
            trust: 0.1,
            url: "https://github.com/live-hack-cve/cve-2020-0590",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-05",
         },
         {
            trust: 0.1,
            url: "https://support.hp.com/us-en/document/c06962236",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-0590",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013188",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1686",
         },
         {
            db: "NVD",
            id: "CVE-2020-0590",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2020-0590",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2020-013188",
         },
         {
            db: "CNNVD",
            id: "CNNVD-201911-1686",
         },
         {
            db: "NVD",
            id: "CVE-2020-0590",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2020-11-12T00:00:00",
            db: "VULMON",
            id: "CVE-2020-0590",
         },
         {
            date: "2021-06-21T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2020-013188",
         },
         {
            date: "2019-11-10T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201911-1686",
         },
         {
            date: "2020-11-12T18:15:00",
            db: "NVD",
            id: "CVE-2020-0590",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-10-19T00:00:00",
            db: "VULMON",
            id: "CVE-2020-0590",
         },
         {
            date: "2021-06-21T07:43:00",
            db: "JVNDB",
            id: "JVNDB-2020-013188",
         },
         {
            date: "2022-10-20T00:00:00",
            db: "CNNVD",
            id: "CNNVD-201911-1686",
         },
         {
            date: "2022-10-19T19:17:00",
            db: "NVD",
            id: "CVE-2020-0590",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201911-1686",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Intel(R) Processor  of  BIOS  Input verification vulnerability in firmware",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2020-013188",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "input validation error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-201911-1686",
         },
      ],
      trust: 0.6,
   },
}

var-202202-0129
Vulnerability from variot

An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.08.41, Kernel 5.1 before 05.16.41, Kernel 5.2 before 05.26.41, Kernel 5.3 before 05.35.41, and Kernel 5.4 before 05.42.20. A stack-based buffer overflow leads toarbitrary code execution in UEFI DisplayTypeDxe DXE driver. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count

SMM Privilege Escalation 10

SMM Memory Corruption 12

DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. Insyde InsydeH2O Kernel Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0129",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.2",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.08.41",
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc627e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.0",
         },
         {
            model: "simatic ipc677e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc847e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.35.41",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.4",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc227g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.16.41",
         },
         {
            model: "simatic ipc327g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc127e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.1",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.42.20",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.3",
         },
         {
            model: "simatic ipc277g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.26.41",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc377g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc647e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: null,
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
         {
            db: "NVD",
            id: "CVE-2021-42059",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.08.41",
                        versionStartIncluding: "5.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.16.41",
                        versionStartIncluding: "5.1",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.26.41",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.35.41",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.42.20",
                        versionStartIncluding: "5.4",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc227g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc277g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc327g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc377g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-42059",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This document was written by Vijay Sarvepalli.Statement Date:   March 01, 2022",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2021-42059",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.2,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2021-42059",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 6.7,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.8,
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 6.7,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-42059",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-42059",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202202-110",
                  trust: 0.6,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
         {
            db: "NVD",
            id: "CVE-2021-42059",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-110",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.08.41, Kernel 5.1 before 05.16.41, Kernel 5.2 before 05.26.41, Kernel 5.3 before 05.35.41, and Kernel 5.4 before 05.42.20. A stack-based buffer overflow leads toarbitrary code execution in UEFI DisplayTypeDxe DXE driver. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count \n\n\n\n\nSMM Privilege Escalation 10 \n\n\n SMM Memory Corruption  12 \n\n\n DXE Memory Corruption 1CVE-2020-27339 Affected\nCVE-2020-5953 Affected\nCVE-2021-33625 Affected\nCVE-2021-33626 Affected\nCVE-2021-33627 Affected\nCVE-2021-41837 Affected\nCVE-2021-41838 Affected\nCVE-2021-41839 Affected\nCVE-2021-41840 Affected\nCVE-2021-41841 Affected\nCVE-2021-42059 Affected\nCVE-2021-42060 Not Affected\nCVE-2021-42113 Affected\nCVE-2021-42554 Affected\nCVE-2021-43323 Affected\nCVE-2021-43522 Affected\nCVE-2021-43615 Not Affected\nCVE-2021-45969 Not Affected\nCVE-2021-45970 Not Affected\nCVE-2021-45971 Not Affected\nCVE-2022-24030 Not Affected\nCVE-2022-24031 Not Affected\nCVE-2022-24069 Not Affected\nCVE-2022-28806 Unknown. Insyde InsydeH2O Kernel Is vulnerable to an out-of-bounds write.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-42059",
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-42059",
            trust: 4,
         },
         {
            db: "SIEMENS",
            id: "SSA-306654",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97136454",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001350",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2022020322",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-73436",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-110",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
         {
            db: "NVD",
            id: "CVE-2021-42059",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-110",
         },
      ],
   },
   id: "VAR-202202-0129",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2023-12-18T11:01:11.077000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Insyde's Security Pledge Security Advisory",
            trust: 0.8,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            title: "Insyde InsydeH2O Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=180204",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-110",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-787",
            trust: 1,
         },
         {
            problemtype: "Out-of-bounds writing (CWE-787) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
         {
            db: "NVD",
            id: "CVE-2021-42059",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
         },
         {
            trust: 1.6,
            url: "https://security.netapp.com/advisory/ntap-20220216-0008/",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge/sa-2022006",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-42059",
         },
         {
            trust: 1,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            trust: 0.8,
            url: "cve-2020-27339  ",
         },
         {
            trust: 0.8,
            url: "cve-2020-5953  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33625  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33626  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33627  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41837  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41838  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41839  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41840  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41841  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42059  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42060  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42113  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42554  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43323  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43522  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43615  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45969  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45970  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45971  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24030  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24031  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24069  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-28806  ",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu97136454/index.html",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/independent-bios-developers-multiple-vulnerabilities-via-uefi-37438",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-73436",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022020322",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
         {
            db: "NVD",
            id: "CVE-2021-42059",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-110",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
         {
            db: "NVD",
            id: "CVE-2021-42059",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-110",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-01T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
         {
            date: "2022-02-03T02:15:07.250000",
            db: "NVD",
            id: "CVE-2021-42059",
         },
         {
            date: "2022-02-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-110",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-28T07:08:00",
            db: "JVNDB",
            id: "JVNDB-2022-001350",
         },
         {
            date: "2022-04-18T18:02:45.103000",
            db: "NVD",
            id: "CVE-2021-42059",
         },
         {
            date: "2022-03-03T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-110",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-110",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-110",
         },
      ],
      trust: 0.6,
   },
}

var-202106-0698
Vulnerability from variot

Race condition in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. plural Intel(R) Processor There is a race condition vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0698",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "solidfire bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "bios",
            scope: "eq",
            trust: 1,
            vendor: "intel",
            version: null,
         },
         {
            model: "simatic ipc677e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic ipc847e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "aff bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc547g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "hci storage node bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "fas bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "simatic ipc627e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "cloud backup",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc527g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc477e pro",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc647e",
            scope: "lt",
            trust: 1,
            vendor: "siemens",
            version: "25.02.10",
         },
         {
            model: "hci compute node bios",
            scope: "eq",
            trust: 1,
            vendor: "netapp",
            version: null,
         },
         {
            model: "bios",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: null,
         },
         {
            model: "bios",
            scope: "eq",
            trust: 0.8,
            vendor: "インテル",
            version: "bios  firmware",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008111",
         },
         {
            db: "NVD",
            id: "CVE-2020-8670",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:intel:bios:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6498du:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1524n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1563n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1573n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1581:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1587:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1612:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1632:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2104g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1205_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1428l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1603_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1603_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1607_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1607_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1620_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1630_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1650_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1660_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1680_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2408l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2418l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2428l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2438l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2603_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2608l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2609_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2618l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2620_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2623_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2628l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2630_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2630l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2637_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2640_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2643_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2648l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2650_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2650l_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2658_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2658a_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2660_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2667_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2670_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2679_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2680_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2683_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2685_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2687w_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2689_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2690_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2695_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2697_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2698_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2699_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2699r_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4610_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4620_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4627_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4640_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4648_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4650_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4655_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4660_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4667_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4669_v3:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8855_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5117:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5117f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5219y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6122:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6129:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6134m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6135:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6137:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6142m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6143:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6162:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6222:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6262:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6269y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8165:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8170m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8174:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8176m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8180m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4106h:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4123:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2102:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2104:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                           {
                              cpe23Uri: "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:intel:bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6498du:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1524n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1563n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1573n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1581:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1587:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1612:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1632:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2104g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1205_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1428l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1603_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1603_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1607_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1607_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1620_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1630_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1650_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1660_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1680_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2408l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2418l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2428l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2438l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2603_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2608l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2609_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2618l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2620_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2623_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2628l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2630_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2630l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2637_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2640_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2643_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2648l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2650_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2650l_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2658_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2658a_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2660_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2667_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2670_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2679_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2680_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2683_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2685_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2687w_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2689_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2690_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2695_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2697_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2698_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2699_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-2699r_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4610_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4620_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4627_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4640_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4648_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4650_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4655_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4660_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4667_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4669_v3:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8855_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5117:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5117f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5219y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6122:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6129:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6134m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6135:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6137:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6142m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6143:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6162:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6222:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6262:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_gold_6269y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8165:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8170m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8174:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8176m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8180m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4106h:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4123:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2102:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2104:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              versionEndExcluding: "25.02.10",
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "25.02.10",
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: false,
                     },
                  ],
                  operator: "AND",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:aff_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:fas_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-8670",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Siemens reported these vulnerabilities to CISA.",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-641",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2020-8670",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "MEDIUM",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "PARTIAL",
                  baseScore: 4.4,
                  confidentialityImpact: "PARTIAL",
                  exploitabilityScore: 3.4,
                  id: "CVE-2020-8670",
                  impactScore: 6.4,
                  integrityImpact: "PARTIAL",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "MEDIUM",
                  trust: 1.9,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:M/Au:N/C:P/I:P/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 6.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 0.5,
                  id: "CVE-2020-8670",
                  impactScore: 5.9,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "UNCHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "High",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 6.4,
                  baseSeverity: "Medium",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2020-8670",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Unchanged",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2020-8670",
                  trust: 1.8,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202104-975",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202106-641",
                  trust: 0.6,
                  value: "MEDIUM",
               },
               {
                  author: "VULMON",
                  id: "CVE-2020-8670",
                  trust: 0.1,
                  value: "MEDIUM",
               },
            ],
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8670",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008111",
         },
         {
            db: "NVD",
            id: "CVE-2020-8670",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-641",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Race condition in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. plural  Intel(R) Processor There is a race condition vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state. Pillow is a Python-based image processing library. \nThere is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements",
      sources: [
         {
            db: "NVD",
            id: "CVE-2020-8670",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008111",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "VULMON",
            id: "CVE-2020-8670",
         },
      ],
      trust: 2.25,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2020-8670",
            trust: 3.3,
         },
         {
            db: "SIEMENS",
            id: "SSA-309571",
            trust: 1.7,
         },
         {
            db: "JVN",
            id: "JVNVU99965981",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008111",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2021041363",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021081109",
            trust: 0.6,
         },
         {
            db: "CS-HELP",
            id: "SB2021061616",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2023.2479",
            trust: 0.6,
         },
         {
            db: "AUSCERT",
            id: "ESB-2021.1995",
            trust: 0.6,
         },
         {
            db: "ICS CERT",
            id: "ICSA-21-222-05",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-62742",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-641",
            trust: 0.6,
         },
         {
            db: "VULMON",
            id: "CVE-2020-8670",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8670",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008111",
         },
         {
            db: "NVD",
            id: "CVE-2020-8670",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-641",
         },
      ],
   },
   id: "VAR-202106-0698",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5185185333333333,
   },
   last_update_date: "2023-05-05T19:42:34.318000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "INTEL-SA-00463",
            trust: 0.8,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html",
         },
         {
            title: "Siemens Security Advisories: Siemens Security Advisory",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories&qid=240e27e5c8fba28153598a375a2a4130",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8670",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008111",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-362",
            trust: 1,
         },
         {
            problemtype: "Race condition (CWE-362) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008111",
         },
         {
            db: "NVD",
            id: "CVE-2020-8670",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.7,
            url: "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html",
         },
         {
            trust: 1.7,
            url: "https://security.netapp.com/advisory/ntap-20210702-0002/",
         },
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu99965981/",
         },
         {
            trust: 0.8,
            url: "https://nvd.nist.gov/vuln/detail/cve-2020-8670",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021041363",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021081109",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/intel-processor-multiple-vulnerabilities-via-bios-firmware-35669",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-62742",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2021.1995",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2021061616",
         },
         {
            trust: 0.6,
            url: "https://www.auscert.org.au/bulletins/esb-2023.2479",
         },
         {
            trust: 0.6,
            url: "https://us-cert.cisa.gov/ics/advisories/icsa-21-222-05",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/362.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://cert-portal.siemens.com/productcert/txt/ssa-309571.txt",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2020-8670",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008111",
         },
         {
            db: "NVD",
            id: "CVE-2020-8670",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-641",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "VULMON",
            id: "CVE-2020-8670",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2021-008111",
         },
         {
            db: "NVD",
            id: "CVE-2020-8670",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202106-641",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-06-09T00:00:00",
            db: "VULMON",
            id: "CVE-2020-8670",
         },
         {
            date: "2022-03-04T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2021-008111",
         },
         {
            date: "2021-06-09T19:15:00",
            db: "NVD",
            id: "CVE-2020-8670",
         },
         {
            date: "2021-04-13T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2021-06-08T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-641",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2021-08-10T00:00:00",
            db: "VULMON",
            id: "CVE-2020-8670",
         },
         {
            date: "2022-03-04T06:25:00",
            db: "JVNDB",
            id: "JVNDB-2021-008111",
         },
         {
            date: "2022-04-22T16:20:00",
            db: "NVD",
            id: "CVE-2020-8670",
         },
         {
            date: "2021-04-14T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
         {
            date: "2023-05-04T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202106-641",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202106-641",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "plural  Intel(R) Processor  Conflict condition vulnerability in firmware",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2021-008111",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "other",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202104-975",
         },
      ],
      trust: 0.6,
   },
}

var-202202-0009
Vulnerability from variot

An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.09.11, 5.1 before 05.17.11, 5.2 before 05.27.11, 5.3 before 05.36.11, 5.4 before 05.44.11, and 5.5 before 05.52.11 affecting FwBlockServiceSmm. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count

SMM Privilege Escalation 10

SMM Memory Corruption 12

DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. Insyde InsydeH2O Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0009",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.16.29",
         },
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc227g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc377g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.1",
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.0",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.35.29",
         },
         {
            model: "simatic ipc847e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc677e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc277g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc627e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.26.29",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.3",
         },
         {
            model: "simatic ipc647e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc127e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.08.29",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc327g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.2",
         },
         {
            model: "insydeh2o",
            scope: null,
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
         {
            db: "NVD",
            id: "CVE-2021-33627",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.08.29",
                        versionStartIncluding: "5.0",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.16.29",
                        versionStartIncluding: "5.1",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.26.29",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.35.29",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc227g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc277g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc327g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc377g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-33627",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This document was written by Vijay Sarvepalli.Statement Date:   March 01, 2022",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2021-33627",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.2,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2021-33627",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 8.2,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.5,
                  impactScore: 6,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 8.2,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-33627",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Changed",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-33627",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202202-115",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-115",
         },
         {
            db: "NVD",
            id: "CVE-2021-33627",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.09.11, 5.1 before 05.17.11, 5.2 before 05.27.11, 5.3 before 05.36.11, 5.4 before 05.44.11, and 5.5 before 05.52.11 affecting FwBlockServiceSmm. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count \n\n\n\n\nSMM Privilege Escalation 10 \n\n\n SMM Memory Corruption  12 \n\n\n DXE Memory Corruption 1CVE-2020-27339 Affected\nCVE-2020-5953 Affected\nCVE-2021-33625 Affected\nCVE-2021-33626 Affected\nCVE-2021-33627 Affected\nCVE-2021-41837 Affected\nCVE-2021-41838 Affected\nCVE-2021-41839 Affected\nCVE-2021-41840 Affected\nCVE-2021-41841 Affected\nCVE-2021-42059 Affected\nCVE-2021-42060 Not Affected\nCVE-2021-42113 Affected\nCVE-2021-42554 Affected\nCVE-2021-43323 Affected\nCVE-2021-43522 Affected\nCVE-2021-43615 Not Affected\nCVE-2021-45969 Not Affected\nCVE-2021-45970 Not Affected\nCVE-2021-45971 Not Affected\nCVE-2022-24030 Not Affected\nCVE-2022-24031 Not Affected\nCVE-2022-24069 Not Affected\nCVE-2022-28806 Unknown. Insyde InsydeH2O Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-33627",
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-33627",
            trust: 4,
         },
         {
            db: "SIEMENS",
            id: "SSA-306654",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97136454",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001344",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2022020316",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-73436",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-115",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-115",
         },
         {
            db: "NVD",
            id: "CVE-2021-33627",
         },
      ],
   },
   id: "VAR-202202-0009",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2024-07-23T19:45:56.033000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Insyde's Security Pledge Security Advisory",
            trust: 0.8,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            title: "Insyde InsydeH2O Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=180209",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-115",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1,
         },
         {
            problemtype: "Buffer error (CWE-119) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
         {
            db: "NVD",
            id: "CVE-2021-33627",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://security.netapp.com/advisory/ntap-20220222-0002/",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge/sa-2022022",
         },
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-33627",
         },
         {
            trust: 0.8,
            url: "cve-2020-27339  ",
         },
         {
            trust: 0.8,
            url: "cve-2020-5953  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33625  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33626  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33627  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41837  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41838  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41839  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41840  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41841  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42059  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42060  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42113  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42554  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43323  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43522  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43615  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45969  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45970  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45971  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24030  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24031  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24069  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-28806  ",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu97136454/index.html",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/independent-bios-developers-multiple-vulnerabilities-via-uefi-37438",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-73436",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022020316",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-115",
         },
         {
            db: "NVD",
            id: "CVE-2021-33627",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-115",
         },
         {
            db: "NVD",
            id: "CVE-2021-33627",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-01T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
         {
            date: "2022-02-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-115",
         },
         {
            date: "2022-02-03T02:15:06.983000",
            db: "NVD",
            id: "CVE-2021-33627",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-28T07:09:00",
            db: "JVNDB",
            id: "JVNDB-2022-001344",
         },
         {
            date: "2022-03-03T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-115",
         },
         {
            date: "2024-07-22T17:15:02.883000",
            db: "NVD",
            id: "CVE-2021-33627",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-115",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-115",
         },
      ],
      trust: 0.6,
   },
}

var-202202-0102
Vulnerability from variot

An issue was discovered in SdHostDriver in the kernel 5.0 through 5.5 in Insyde InsydeH2O. There is an SMM callout that allows an attacker to access the System Management Mode and execute arbitrary code. This occurs because of a Numeric Range Comparison Without a Minimum Check. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count

SMM Privilege Escalation 10

SMM Memory Corruption 12

DXE Memory Corruption 1CVE-2020-27339 Affected CVE-2020-5953 Affected CVE-2021-33625 Affected CVE-2021-33626 Affected CVE-2021-33627 Affected CVE-2021-41837 Affected CVE-2021-41838 Affected CVE-2021-41839 Affected CVE-2021-41840 Affected CVE-2021-41841 Affected CVE-2021-42059 Affected CVE-2021-42060 Not Affected CVE-2021-42113 Affected CVE-2021-42554 Affected CVE-2021-43323 Affected CVE-2021-43522 Affected CVE-2021-43615 Not Affected CVE-2021-45969 Not Affected CVE-2021-45970 Not Affected CVE-2021-45971 Not Affected CVE-2022-24030 Not Affected CVE-2022-24031 Not Affected CVE-2022-24069 Not Affected CVE-2022-28806 Unknown. Insyde InsydeH2O Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-202202-0102",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "simatic ipc477e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.2",
         },
         {
            model: "simatic field pg m5",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc627e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc677e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc847e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.4",
         },
         {
            model: "simatic ipc427e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc227g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc327g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc127e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.1",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.3",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.35.42",
         },
         {
            model: "simatic ipc277g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc647e",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic field pg m6",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic ipc377g",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "simatic itp1000",
            scope: "eq",
            trust: 1,
            vendor: "siemens",
            version: "*",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.26.42",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.16.42",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.51.42",
         },
         {
            model: "insydeh2o",
            scope: "gte",
            trust: 1,
            vendor: "insyde",
            version: "5.5",
         },
         {
            model: "insydeh2o",
            scope: "lt",
            trust: 1,
            vendor: "insyde",
            version: "5.43.42",
         },
         {
            model: "insydeh2o",
            scope: null,
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
         {
            model: "insydeh2o",
            scope: "eq",
            trust: 0.8,
            vendor: "insyde",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
         {
            db: "NVD",
            id: "CVE-2021-41838",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.16.42",
                        versionStartIncluding: "5.1",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.26.42",
                        versionStartIncluding: "5.2",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.35.42",
                        versionStartIncluding: "5.3",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.43.42",
                        versionStartIncluding: "5.4",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
                        cpe_name: [],
                        versionEndExcluding: "5.51.42",
                        versionStartIncluding: "5.5",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc227g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc277g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc327g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc377g_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
               {
                  children: [
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: true,
                           },
                        ],
                        operator: "OR",
                     },
                     {
                        children: [],
                        cpe_match: [
                           {
                              cpe23Uri: "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*",
                              cpe_name: [],
                              vulnerable: false,
                           },
                        ],
                        operator: "OR",
                     },
                  ],
                  cpe_match: [],
                  operator: "AND",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41838",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "This document was written by Vijay Sarvepalli.Statement Date:   March 01, 2022",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   cve: "CVE-2021-41838",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "LOCAL",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 7.2,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 3.9,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: false,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Local",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 7.2,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2021-41838",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:L/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [
               {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  author: "NVD",
                  availabilityImpact: "HIGH",
                  baseScore: 8.2,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  exploitabilityScore: 1.5,
                  impactScore: 6,
                  integrityImpact: "HIGH",
                  privilegesRequired: "HIGH",
                  scope: "CHANGED",
                  trust: 1,
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.1",
               },
               {
                  attackComplexity: "Low",
                  attackVector: "Local",
                  author: "NVD",
                  availabilityImpact: "High",
                  baseScore: 8.2,
                  baseSeverity: "High",
                  confidentialityImpact: "High",
                  exploitabilityScore: null,
                  id: "CVE-2021-41838",
                  impactScore: null,
                  integrityImpact: "High",
                  privilegesRequired: "High",
                  scope: "Changed",
                  trust: 0.8,
                  userInteraction: "None",
                  vectorString: "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
                  version: "3.0",
               },
            ],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2021-41838",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-202202-112",
                  trust: 0.6,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
         {
            db: "NVD",
            id: "CVE-2021-41838",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-112",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "An issue was discovered in SdHostDriver in the kernel 5.0 through 5.5 in Insyde InsydeH2O. There is an SMM callout that allows an attacker to access the System Management Mode and execute arbitrary code. This occurs because of a Numeric Range Comparison Without a Minimum Check. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count \n\n\n\n\nSMM Privilege Escalation 10 \n\n\n SMM Memory Corruption  12 \n\n\n DXE Memory Corruption 1CVE-2020-27339 Affected\nCVE-2020-5953 Affected\nCVE-2021-33625 Affected\nCVE-2021-33626 Affected\nCVE-2021-33627 Affected\nCVE-2021-41837 Affected\nCVE-2021-41838 Affected\nCVE-2021-41839 Affected\nCVE-2021-41840 Affected\nCVE-2021-41841 Affected\nCVE-2021-42059 Affected\nCVE-2021-42060 Not Affected\nCVE-2021-42113 Affected\nCVE-2021-42554 Affected\nCVE-2021-43323 Affected\nCVE-2021-43522 Affected\nCVE-2021-43615 Not Affected\nCVE-2021-45969 Not Affected\nCVE-2021-45970 Not Affected\nCVE-2021-45971 Not Affected\nCVE-2022-24030 Not Affected\nCVE-2022-24031 Not Affected\nCVE-2022-24069 Not Affected\nCVE-2022-28806 Unknown. Insyde InsydeH2O Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted  (DoS) It may be put into a state",
      sources: [
         {
            db: "NVD",
            id: "CVE-2021-41838",
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
      ],
      trust: 2.34,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "NVD",
            id: "CVE-2021-41838",
            trust: 4,
         },
         {
            db: "SIEMENS",
            id: "SSA-306654",
            trust: 1.6,
         },
         {
            db: "CERT/CC",
            id: "VU#796611",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU98748974",
            trust: 0.8,
         },
         {
            db: "JVN",
            id: "JVNVU97136454",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001346",
            trust: 0.8,
         },
         {
            db: "CS-HELP",
            id: "SB2022020315",
            trust: 0.6,
         },
         {
            db: "LENOVO",
            id: "LEN-73436",
            trust: 0.6,
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-112",
            trust: 0.6,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
         {
            db: "NVD",
            id: "CVE-2021-41838",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-112",
         },
      ],
   },
   id: "VAR-202202-0102",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.5,
   },
   last_update_date: "2023-12-18T11:19:40.640000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "Insyde's Security Pledge Security Advisory",
            trust: 0.8,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            title: "Insyde InsydeH2O Buffer error vulnerability fix",
            trust: 0.6,
            url: "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=184451",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-112",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 1,
         },
         {
            problemtype: "Buffer error (CWE-119) [NVD Evaluation ]",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
         {
            db: "NVD",
            id: "CVE-2021-41838",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 1.6,
            url: "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf",
         },
         {
            trust: 1.6,
            url: "https://security.netapp.com/advisory/ntap-20220222-0001/",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge",
         },
         {
            trust: 1.6,
            url: "https://www.insyde.com/security-pledge/sa-2022023",
         },
         {
            trust: 1.4,
            url: "https://nvd.nist.gov/vuln/detail/cve-2021-41838",
         },
         {
            trust: 0.8,
            url: "cve-2020-27339  ",
         },
         {
            trust: 0.8,
            url: "cve-2020-5953  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33625  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33626  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-33627  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41837  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41838  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41839  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41840  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-41841  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42059  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42060  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42113  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-42554  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43323  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43522  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-43615  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45969  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45970  ",
         },
         {
            trust: 0.8,
            url: "cve-2021-45971  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24030  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24031  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-24069  ",
         },
         {
            trust: 0.8,
            url: "cve-2022-28806  ",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu97136454/index.html",
         },
         {
            trust: 0.8,
            url: "https://jvn.jp/vu/jvnvu98748974/",
         },
         {
            trust: 0.6,
            url: "https://vigilance.fr/vulnerability/independent-bios-developers-multiple-vulnerabilities-via-uefi-37438",
         },
         {
            trust: 0.6,
            url: "https://www.cybersecurity-help.cz/vdb/sb2022020315",
         },
         {
            trust: 0.6,
            url: "https://support.lenovo.com/us/en/product_security/len-73436",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
         {
            db: "NVD",
            id: "CVE-2021-41838",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-112",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
         {
            db: "NVD",
            id: "CVE-2021-41838",
         },
         {
            db: "CNNVD",
            id: "CNNVD-202202-112",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-02-01T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-17T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
         {
            date: "2022-02-03T02:15:07.080000",
            db: "NVD",
            id: "CVE-2021-41838",
         },
         {
            date: "2022-02-02T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-112",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2022-04-26T00:00:00",
            db: "CERT/CC",
            id: "VU#796611",
         },
         {
            date: "2022-02-28T07:09:00",
            db: "JVNDB",
            id: "JVNDB-2022-001346",
         },
         {
            date: "2022-03-01T19:42:25.170000",
            db: "NVD",
            id: "CVE-2021-41838",
         },
         {
            date: "2022-03-10T00:00:00",
            db: "CNNVD",
            id: "CNNVD-202202-112",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "local",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-112",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#796611",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "buffer error",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-202202-112",
         },
      ],
      trust: 0.6,
   },
}

cve-2024-56182
Vulnerability from cvelistv5
Published
2025-03-11 09:48
Modified
2025-03-11 14:05
Summary
A vulnerability has been identified in SIMATIC Field PG M5 (All versions), SIMATIC Field PG M6 (All versions < V26.01.12), SIMATIC IPC BX-21A (All versions < V31.01.07), SIMATIC IPC BX-32A (All versions < V29.01.07), SIMATIC IPC BX-39A (All versions < V29.01.07), SIMATIC IPC BX-59A (All versions < V32.01.04), SIMATIC IPC PX-32A (All versions < V29.01.07), SIMATIC IPC PX-39A (All versions < V29.01.07), SIMATIC IPC PX-39A PRO (All versions < V29.01.07), SIMATIC IPC RC-543B (All versions), SIMATIC IPC RW-543A (All versions), SIMATIC IPC127E (All versions), SIMATIC IPC227E (All versions), SIMATIC IPC227G (All versions), SIMATIC IPC277E (All versions), SIMATIC IPC277G (All versions), SIMATIC IPC277G PRO (All versions), SIMATIC IPC3000 SMART V3 (All versions), SIMATIC IPC327G (All versions), SIMATIC IPC347G (All versions), SIMATIC IPC377G (All versions), SIMATIC IPC427E (All versions), SIMATIC IPC477E (All versions), SIMATIC IPC477E PRO (All versions), SIMATIC IPC527G (All versions), SIMATIC IPC627E (All versions < V25.02.15), SIMATIC IPC647E (All versions < V25.02.15), SIMATIC IPC677E (All versions < V25.02.15), SIMATIC IPC847E (All versions < V25.02.15), SIMATIC ITP1000 (All versions). The affected devices have insufficient protection mechanism for the EFI(Extensible Firmware Interface) variables stored on the device. This could allow an authenticated attacker to disable the BIOS password without proper authorization by directly communicate with the flash controller.
Impacted products
Vendor Product Version
Siemens SIMATIC Field PG M5 Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC Field PG M6 Version: 0   < V26.01.12
Create a notification for this product.
   Siemens SIMATIC IPC BX-21A Version: 0   < V31.01.07
Create a notification for this product.
   Siemens SIMATIC IPC BX-32A Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC BX-39A Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC BX-59A Version: 0   < V32.01.04
Create a notification for this product.
   Siemens SIMATIC IPC PX-32A Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC PX-39A Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC PX-39A PRO Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC RC-543B Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC RW-543A Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC127E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC227E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC227G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC277E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC277G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC277G PRO Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC3000 SMART V3 Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC327G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC347G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC377G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC427E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC477E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC477E PRO Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC527G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC627E Version: 0   < V25.02.15
Create a notification for this product.
   Siemens SIMATIC IPC647E Version: 0   < V25.02.15
Create a notification for this product.
   Siemens SIMATIC IPC677E Version: 0   < V25.02.15
Create a notification for this product.
   Siemens SIMATIC IPC847E Version: 0   < V25.02.15
Create a notification for this product.
   Siemens SIMATIC ITP1000 Version: 0   < *
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-56182",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-11T14:03:47.493714Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-11T14:05:53.276Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "SIMATIC Field PG M5",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC Field PG M6",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V26.01.12",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC BX-21A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V31.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC BX-32A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC BX-39A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC BX-59A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V32.01.04",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC PX-32A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC PX-39A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC PX-39A PRO",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC RC-543B",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC RW-543A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC127E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC227E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC227G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC277E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC277G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC277G PRO",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC3000 SMART V3",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC327G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC347G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC377G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC427E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC477E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC477E PRO",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC527G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC627E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V25.02.15",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC647E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V25.02.15",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC677E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V25.02.15",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC847E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V25.02.15",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC ITP1000",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in SIMATIC Field PG M5 (All versions), SIMATIC Field PG M6 (All versions < V26.01.12), SIMATIC IPC BX-21A (All versions < V31.01.07), SIMATIC IPC BX-32A (All versions < V29.01.07), SIMATIC IPC BX-39A (All versions < V29.01.07), SIMATIC IPC BX-59A (All versions < V32.01.04), SIMATIC IPC PX-32A (All versions < V29.01.07), SIMATIC IPC PX-39A (All versions < V29.01.07), SIMATIC IPC PX-39A PRO (All versions < V29.01.07), SIMATIC IPC RC-543B (All versions), SIMATIC IPC RW-543A (All versions), SIMATIC IPC127E (All versions), SIMATIC IPC227E (All versions), SIMATIC IPC227G (All versions), SIMATIC IPC277E (All versions), SIMATIC IPC277G (All versions), SIMATIC IPC277G PRO (All versions), SIMATIC IPC3000 SMART V3 (All versions), SIMATIC IPC327G (All versions), SIMATIC IPC347G (All versions), SIMATIC IPC377G (All versions), SIMATIC IPC427E (All versions), SIMATIC IPC477E (All versions), SIMATIC IPC477E PRO (All versions), SIMATIC IPC527G (All versions), SIMATIC IPC627E (All versions < V25.02.15), SIMATIC IPC647E (All versions < V25.02.15), SIMATIC IPC677E (All versions < V25.02.15), SIMATIC IPC847E (All versions < V25.02.15), SIMATIC ITP1000 (All versions). The affected devices have insufficient protection mechanism for the EFI(Extensible Firmware Interface) variables stored on the device. This could allow an authenticated attacker to disable the BIOS password without proper authorization by directly communicate with the flash controller.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.2,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
            },
            {
               cvssV4_0: {
                  baseScore: 8.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H",
                  version: "4.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-693",
                     description: "CWE-693: Protection Mechanism Failure",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-11T09:48:05.319Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/html/ssa-216014.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2024-56182",
      datePublished: "2025-03-11T09:48:05.319Z",
      dateReserved: "2024-12-18T12:06:43.292Z",
      dateUpdated: "2025-03-11T14:05:53.276Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

cve-2024-56181
Vulnerability from cvelistv5
Published
2025-03-11 09:48
Modified
2025-03-11 14:06
Summary
A vulnerability has been identified in SIMATIC Field PG M5 (All versions), SIMATIC IPC BX-21A (All versions < V31.01.07), SIMATIC IPC BX-32A (All versions < V29.01.07), SIMATIC IPC BX-39A (All versions < V29.01.07), SIMATIC IPC BX-59A (All versions < V32.01.04), SIMATIC IPC PX-32A (All versions < V29.01.07), SIMATIC IPC PX-39A (All versions < V29.01.07), SIMATIC IPC PX-39A PRO (All versions < V29.01.07), SIMATIC IPC RC-543B (All versions), SIMATIC IPC RW-543A (All versions), SIMATIC IPC127E (All versions), SIMATIC IPC227E (All versions), SIMATIC IPC227G (All versions), SIMATIC IPC277E (All versions), SIMATIC IPC277G (All versions), SIMATIC IPC277G PRO (All versions), SIMATIC IPC3000 SMART V3 (All versions), SIMATIC IPC327G (All versions), SIMATIC IPC347G (All versions), SIMATIC IPC377G (All versions), SIMATIC IPC427E (All versions), SIMATIC IPC477E (All versions), SIMATIC IPC477E PRO (All versions), SIMATIC IPC527G (All versions), SIMATIC IPC627E (All versions < V25.02.15), SIMATIC IPC647E (All versions < V25.02.15), SIMATIC IPC677E (All versions < V25.02.15), SIMATIC IPC847E (All versions < V25.02.15), SIMATIC ITP1000 (All versions). The affected devices have insufficient protection mechanism for the EFI(Extensible Firmware Interface) variables stored on the device. This could allow an authenticated attacker to alter the secure boot configuration without proper authorization by directly communicate with the flash controller.
Impacted products
Vendor Product Version
Siemens SIMATIC Field PG M5 Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC BX-21A Version: 0   < V31.01.07
Create a notification for this product.
   Siemens SIMATIC IPC BX-32A Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC BX-39A Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC BX-59A Version: 0   < V32.01.04
Create a notification for this product.
   Siemens SIMATIC IPC PX-32A Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC PX-39A Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC PX-39A PRO Version: 0   < V29.01.07
Create a notification for this product.
   Siemens SIMATIC IPC RC-543B Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC RW-543A Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC127E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC227E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC227G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC277E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC277G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC277G PRO Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC3000 SMART V3 Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC327G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC347G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC377G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC427E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC477E Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC477E PRO Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC527G Version: 0   < *
Create a notification for this product.
   Siemens SIMATIC IPC627E Version: 0   < V25.02.15
Create a notification for this product.
   Siemens SIMATIC IPC647E Version: 0   < V25.02.15
Create a notification for this product.
   Siemens SIMATIC IPC677E Version: 0   < V25.02.15
Create a notification for this product.
   Siemens SIMATIC IPC847E Version: 0   < V25.02.15
Create a notification for this product.
   Siemens SIMATIC ITP1000 Version: 0   < *
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-56181",
                        options: [
                           {
                              Exploitation: "none",
                           },
                           {
                              Automatable: "no",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2025-03-11T14:06:38.581942Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-11T14:06:50.557Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unknown",
               product: "SIMATIC Field PG M5",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC BX-21A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V31.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC BX-32A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC BX-39A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC BX-59A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V32.01.04",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC PX-32A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC PX-39A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC PX-39A PRO",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V29.01.07",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC RC-543B",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC RW-543A",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC127E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC227E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC227G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC277E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC277G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC277G PRO",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC3000 SMART V3",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC327G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC347G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC377G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC427E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC477E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC477E PRO",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC527G",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC627E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V25.02.15",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC647E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V25.02.15",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC677E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V25.02.15",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC IPC847E",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "V25.02.15",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unknown",
               product: "SIMATIC ITP1000",
               vendor: "Siemens",
               versions: [
                  {
                     lessThan: "*",
                     status: "affected",
                     version: "0",
                     versionType: "custom",
                  },
               ],
            },
         ],
         descriptions: [
            {
               lang: "en",
               value: "A vulnerability has been identified in SIMATIC Field PG M5 (All versions), SIMATIC IPC BX-21A (All versions < V31.01.07), SIMATIC IPC BX-32A (All versions < V29.01.07), SIMATIC IPC BX-39A (All versions < V29.01.07), SIMATIC IPC BX-59A (All versions < V32.01.04), SIMATIC IPC PX-32A (All versions < V29.01.07), SIMATIC IPC PX-39A (All versions < V29.01.07), SIMATIC IPC PX-39A PRO (All versions < V29.01.07), SIMATIC IPC RC-543B (All versions), SIMATIC IPC RW-543A (All versions), SIMATIC IPC127E (All versions), SIMATIC IPC227E (All versions), SIMATIC IPC227G (All versions), SIMATIC IPC277E (All versions), SIMATIC IPC277G (All versions), SIMATIC IPC277G PRO (All versions), SIMATIC IPC3000 SMART V3 (All versions), SIMATIC IPC327G (All versions), SIMATIC IPC347G (All versions), SIMATIC IPC377G (All versions), SIMATIC IPC427E (All versions), SIMATIC IPC477E (All versions), SIMATIC IPC477E PRO (All versions), SIMATIC IPC527G (All versions), SIMATIC IPC627E (All versions < V25.02.15), SIMATIC IPC647E (All versions < V25.02.15), SIMATIC IPC677E (All versions < V25.02.15), SIMATIC IPC847E (All versions < V25.02.15), SIMATIC ITP1000 (All versions). The affected devices have insufficient protection mechanism for the EFI(Extensible Firmware Interface) variables stored on the device. This could allow an authenticated attacker to alter the secure boot configuration without proper authorization by directly communicate with the flash controller.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  baseScore: 8.2,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C",
                  version: "3.1",
               },
            },
            {
               cvssV4_0: {
                  baseScore: 8.4,
                  baseSeverity: "HIGH",
                  vectorString: "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H",
                  version: "4.0",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-693",
                     description: "CWE-693: Protection Mechanism Failure",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2025-03-11T09:48:03.703Z",
            orgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
            shortName: "siemens",
         },
         references: [
            {
               url: "https://cert-portal.siemens.com/productcert/html/ssa-216014.html",
            },
         ],
      },
   },
   cveMetadata: {
      assignerOrgId: "cec7a2ec-15b4-4faf-bd53-b40f371f3a77",
      assignerShortName: "siemens",
      cveId: "CVE-2024-56181",
      datePublished: "2025-03-11T09:48:03.703Z",
      dateReserved: "2024-12-18T12:06:43.292Z",
      dateUpdated: "2025-03-11T14:06:50.557Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}