Vulnerabilites related to Siemens - SIMATIC IPC647D
var-201809-1075
Vulnerability from variot
Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access. Intel CSME The firmware contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple Siemens Products are prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2. A denial-of-service vulnerability 3. A side channel attack information disclosure vulnerability Attackers can exploit these issues to execute arbitrary code within the context of an affected device or obtain sensitive information or cause a denial-of-service condition. The following Siemens products are affected: SIMATIC FieldPG M5 All versions prior to 22.01.06, SIMATIC IPC427E All versions prior to 21.01.09, SIMATIC IPC477E All versions prior to 21.01.09, SIMATIC IPC547E All versions prior to R1.30.0, SIMATIC IPC547G All versions prior to R1.23.0, SIMATIC IPC627D All versions prior to 19.02.11, SIMATIC IPC647D All versions prior to 19.01.14, SIMATIC IPC677D All versions prior to 19.02.11, SIMATIC IPC827D All versions prior to 19.02.11, SIMATIC IPC847D All versions prior to 19.01.14, and SIMATIC ITP1000 All versions prior to 23.01.04. Intel CSME is a converged security management engine developed by Intel Corporation. Intel AMT is one of the active management technology modules. An attacker could cause a denial of service (memory leak) by exploiting this vulnerability
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201809-1075", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "simatic itp1000", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "23.01.04" }, { "model": "simatic ipc477e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.09" }, { "model": "active management technology", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "12.0.5" }, { "model": "simatic ipc827d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.02.11" }, { "model": "manageability engine", "scope": "gte", "trust": 1.0, "vendor": "intel", "version": "9.0.0.0" }, { "model": "simatic field pg m5", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "22.01.06" }, { "model": "simatic pc547g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "r1.23.0" }, { "model": "simatic ipc677d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.02.11" }, { "model": "simatic ipc627d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.02.11" }, { "model": "simatic ipc427e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.09" }, { "model": "simatic ipc547e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "r1.30.0" }, { "model": "converged security management engine", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "12.0.5" }, { "model": "manageability engine", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "11.0" }, { "model": "simatic ipc647d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.01.14" }, { "model": "converged security management engine", "scope": "gte", "trust": 1.0, "vendor": "intel", "version": "11.0.0" }, { "model": "simatic ipc847d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.01.14" }, { "model": "csme", "scope": "lt", "trust": 0.8, "vendor": "intel", "version": "12.0.5" }, { "model": "converged security management engine", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": null }, { "model": "simatic itp1000", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc847d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc827d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc677d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc647d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc627d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc547g", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc547e", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc477e", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc427e", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic fieldpg m5", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc847d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.01.14" }, { "model": "simatic ipc827d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.02.11" }, { "model": "simatic ipc677d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.01.11" }, { "model": "simatic ipc647d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.01.14" }, { "model": "simatic ipc627d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.02.11" }, { "model": "simatic ipc547g r1.23.0", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": null }, { "model": "simatic ipc547e r1.30.0", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": null }, { "model": "simatic ipc477e", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v21.01.09" }, { "model": "simatic ipc427e", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v21.01.09" }, { "model": "simatic fieldpg m5", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v22.01.06" } ], "sources": [ { "db": "BID", "id": "106996" }, { "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "db": "CNNVD", "id": "CNNVD-201809-604" }, { "db": "NVD", "id": "CVE-2018-3658" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:intel:csme_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013145" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.,Siemens reported these vulnerabilities to NCCIC.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-604" } ], "trust": 0.6 }, "cve": "CVE-2018-3658", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2018-3658", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-133689", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2018-3658", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2018-3658", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-3658", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2018-3658", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201809-604", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-133689", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-133689" }, { "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "db": "CNNVD", "id": "CNNVD-201809-604" }, { "db": "NVD", "id": "CVE-2018-3658" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access. Intel CSME The firmware contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Multiple Siemens Products are prone to the following security vulnerabilities:\n1. Multiple stack-based buffer-overflow vulnerabilities\n2. A denial-of-service vulnerability\n3. A side channel attack information disclosure vulnerability\nAttackers can exploit these issues to execute arbitrary code within the context of an affected device or obtain sensitive information or cause a denial-of-service condition. \nThe following Siemens products are affected:\nSIMATIC FieldPG M5 All versions prior to 22.01.06,\nSIMATIC IPC427E All versions prior to 21.01.09,\nSIMATIC IPC477E All versions prior to 21.01.09,\nSIMATIC IPC547E All versions prior to R1.30.0,\nSIMATIC IPC547G All versions prior to R1.23.0,\nSIMATIC IPC627D All versions prior to 19.02.11,\nSIMATIC IPC647D All versions prior to 19.01.14,\nSIMATIC IPC677D All versions prior to 19.02.11,\nSIMATIC IPC827D All versions prior to 19.02.11,\nSIMATIC IPC847D All versions prior to 19.01.14, and\nSIMATIC ITP1000 All versions prior to 23.01.04. Intel CSME is a converged security management engine developed by Intel Corporation. Intel AMT is one of the active management technology modules. An attacker could cause a denial of service (memory leak) by exploiting this vulnerability", "sources": [ { "db": "NVD", "id": "CVE-2018-3658" }, { "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "db": "BID", "id": "106996" }, { "db": "VULHUB", "id": "VHN-133689" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-3658", "trust": 2.8 }, { "db": "ICS CERT", "id": "ICSA-19-043-05", "trust": 2.8 }, { "db": "BID", "id": "106996", "trust": 2.0 }, { "db": "SIEMENS", "id": "SSA-377318", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2018-013145", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-604", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.0444", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-133689", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-133689" }, { "db": "BID", "id": "106996" }, { "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "db": "CNNVD", "id": "CNNVD-201809-604" }, { "db": "NVD", "id": "CVE-2018-3658" } ] }, "id": "VAR-201809-1075", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-133689" } ], "trust": 0.71611305 }, "last_update_date": "2024-11-23T21:38:16.943000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "INTEL-SA-00141", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "title": "Intel CSME Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=84863" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "db": "CNNVD", "id": "CNNVD-201809-604" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-772", "trust": 1.1 }, { "problemtype": "CWE-399", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-133689" }, { "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "db": "NVD", "id": "CVE-2018-3658" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-043-05" }, { "trust": 2.9, "url": "http://www.securityfocus.com/bid/106996" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "trust": 1.6, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03876en_us" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3658" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3658" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/75474" }, { "trust": 0.3, "url": "http://subscriber.communications.siemens.com/" }, { "trust": 0.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026amp;docid=emr_na-hpesbhf03876en_us" } ], "sources": [ { "db": "VULHUB", "id": "VHN-133689" }, { "db": "BID", "id": "106996" }, { "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "db": "CNNVD", "id": "CNNVD-201809-604" }, { "db": "NVD", "id": "CVE-2018-3658" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-133689" }, { "db": "BID", "id": "106996" }, { "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "db": "CNNVD", "id": "CNNVD-201809-604" }, { "db": "NVD", "id": "CVE-2018-3658" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-12T00:00:00", "db": "VULHUB", "id": "VHN-133689" }, { "date": "2019-02-12T00:00:00", "db": "BID", "id": "106996" }, { "date": "2019-02-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "date": "2018-09-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-604" }, { "date": "2018-09-12T19:29:02.967000", "db": "NVD", "id": "CVE-2018-3658" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-133689" }, { "date": "2019-02-12T00:00:00", "db": "BID", "id": "106996" }, { "date": "2019-02-15T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-013145" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-604" }, { "date": "2024-11-21T04:05:51.020000", "db": "NVD", "id": "CVE-2018-3658" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-604" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel CSME Firmware resource management vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-013145" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-604" } ], "trust": 0.6 } }
var-201809-1074
Vulnerability from variot
Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access. Intel CSME The firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Multiple Siemens Products are prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2. A denial-of-service vulnerability 3. A side channel attack information disclosure vulnerability Attackers can exploit these issues to execute arbitrary code within the context of an affected device or obtain sensitive information or cause a denial-of-service condition. The following Siemens products are affected: SIMATIC FieldPG M5 All versions prior to 22.01.06, SIMATIC IPC427E All versions prior to 21.01.09, SIMATIC IPC477E All versions prior to 21.01.09, SIMATIC IPC547E All versions prior to R1.30.0, SIMATIC IPC547G All versions prior to R1.23.0, SIMATIC IPC627D All versions prior to 19.02.11, SIMATIC IPC647D All versions prior to 19.01.14, SIMATIC IPC677D All versions prior to 19.02.11, SIMATIC IPC827D All versions prior to 19.02.11, SIMATIC IPC847D All versions prior to 19.01.14, and SIMATIC ITP1000 All versions prior to 23.01.04. Intel CSME is a converged security management engine developed by Intel Corporation. Intel AMT is one of the active management technology modules
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201809-1074", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "converged security management engine", "scope": "lt", "trust": 1.8, "vendor": "intel", "version": "12.0.5" }, { "model": "simatic itp1000", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "23.01.04" }, { "model": "simatic ipc477e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.09" }, { "model": "active management technology", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "12.0.5" }, { "model": "simatic ipc827d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.02.11" }, { "model": "manageability engine", "scope": "gte", "trust": 1.0, "vendor": "intel", "version": "9.0.0.0" }, { "model": "simatic field pg m5", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "22.01.06" }, { "model": "simatic pc547g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "r1.23.0" }, { "model": "simatic ipc677d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.02.11" }, { "model": "simatic ipc627d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.02.11" }, { "model": "simatic ipc427e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.09" }, { "model": "simatic ipc547e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "r1.30.0" }, { "model": "manageability engine", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "11.0" }, { "model": "simatic ipc647d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.01.14" }, { "model": "converged security management engine", "scope": "gte", "trust": 1.0, "vendor": "intel", "version": "11.0.0" }, { "model": "simatic ipc847d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.01.14" }, { "model": "converged security management engine", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": null }, { "model": "simatic itp1000", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc847d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc827d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc677d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc647d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc627d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc547g", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc547e", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc477e", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc427e", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic fieldpg m5", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc847d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.01.14" }, { "model": "simatic ipc827d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.02.11" }, { "model": "simatic ipc677d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.01.11" }, { "model": "simatic ipc647d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.01.14" }, { "model": "simatic ipc627d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.02.11" }, { "model": "simatic ipc547g r1.23.0", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": null }, { "model": "simatic ipc547e r1.30.0", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": null }, { "model": "simatic ipc477e", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v21.01.09" }, { "model": "simatic ipc427e", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v21.01.09" }, { "model": "simatic fieldpg m5", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v22.01.06" } ], "sources": [ { "db": "BID", "id": "106996" }, { "db": "JVNDB", "id": "JVNDB-2018-012408" }, { "db": "CNNVD", "id": "CNNVD-201809-605" }, { "db": "NVD", "id": "CVE-2018-3657" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:intel:converged_security_management_engine_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-012408" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.,Siemens reported these vulnerabilities to NCCIC.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-605" } ], "trust": 0.6 }, "cve": "CVE-2018-3657", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2018-3657", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-133688", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 0.8, "id": "CVE-2018-3657", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 6.7, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-3657", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-3657", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2018-3657", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201809-605", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-133688", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-133688" }, { "db": "JVNDB", "id": "JVNDB-2018-012408" }, { "db": "CNNVD", "id": "CNNVD-201809-605" }, { "db": "NVD", "id": "CVE-2018-3657" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access. Intel CSME The firmware contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Multiple Siemens Products are prone to the following security vulnerabilities:\n1. Multiple stack-based buffer-overflow vulnerabilities\n2. A denial-of-service vulnerability\n3. A side channel attack information disclosure vulnerability\nAttackers can exploit these issues to execute arbitrary code within the context of an affected device or obtain sensitive information or cause a denial-of-service condition. \nThe following Siemens products are affected:\nSIMATIC FieldPG M5 All versions prior to 22.01.06,\nSIMATIC IPC427E All versions prior to 21.01.09,\nSIMATIC IPC477E All versions prior to 21.01.09,\nSIMATIC IPC547E All versions prior to R1.30.0,\nSIMATIC IPC547G All versions prior to R1.23.0,\nSIMATIC IPC627D All versions prior to 19.02.11,\nSIMATIC IPC647D All versions prior to 19.01.14,\nSIMATIC IPC677D All versions prior to 19.02.11,\nSIMATIC IPC827D All versions prior to 19.02.11,\nSIMATIC IPC847D All versions prior to 19.01.14, and\nSIMATIC ITP1000 All versions prior to 23.01.04. Intel CSME is a converged security management engine developed by Intel Corporation. Intel AMT is one of the active management technology modules", "sources": [ { "db": "NVD", "id": "CVE-2018-3657" }, { "db": "JVNDB", "id": "JVNDB-2018-012408" }, { "db": "BID", "id": "106996" }, { "db": "VULHUB", "id": "VHN-133688" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-3657", "trust": 2.8 }, { "db": "ICS CERT", "id": "ICSA-19-043-05", "trust": 2.8 }, { "db": "BID", "id": "106996", "trust": 2.0 }, { "db": "SIEMENS", "id": "SSA-377318", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2018-012408", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-605", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.0444", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-133688", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-133688" }, { "db": "BID", "id": "106996" }, { "db": "JVNDB", "id": "JVNDB-2018-012408" }, { "db": "CNNVD", "id": "CNNVD-201809-605" }, { "db": "NVD", "id": "CVE-2018-3657" } ] }, "id": "VAR-201809-1074", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-133688" } ], "trust": 0.6769231 }, "last_update_date": "2024-11-23T21:38:16.974000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "INTEL-SA-00141", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "title": "Intel CSME AMT Buffer error vulnerability fix", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=84864" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-012408" }, { "db": "CNNVD", "id": "CNNVD-201809-605" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-133688" }, { "db": "JVNDB", "id": "JVNDB-2018-012408" }, { "db": "NVD", "id": "CVE-2018-3657" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-043-05" }, { "trust": 2.9, "url": "http://www.securityfocus.com/bid/106996" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "trust": 1.6, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03876en_us" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3657" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3657" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/75474" }, { "trust": 0.3, "url": "http://subscriber.communications.siemens.com/" }, { "trust": 0.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026amp;docid=emr_na-hpesbhf03876en_us" } ], "sources": [ { "db": "VULHUB", "id": "VHN-133688" }, { "db": "BID", "id": "106996" }, { "db": "JVNDB", "id": "JVNDB-2018-012408" }, { "db": "CNNVD", "id": "CNNVD-201809-605" }, { "db": "NVD", "id": "CVE-2018-3657" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-133688" }, { "db": "BID", "id": "106996" }, { "db": "JVNDB", "id": "JVNDB-2018-012408" }, { "db": "CNNVD", "id": "CNNVD-201809-605" }, { "db": "NVD", "id": "CVE-2018-3657" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-12T00:00:00", "db": "VULHUB", "id": "VHN-133688" }, { "date": "2019-02-12T00:00:00", "db": "BID", "id": "106996" }, { "date": "2019-02-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-012408" }, { "date": "2018-09-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-605" }, { "date": "2018-09-12T19:29:02.840000", "db": "NVD", "id": "CVE-2018-3657" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-02-28T00:00:00", "db": "VULHUB", "id": "VHN-133688" }, { "date": "2019-02-12T00:00:00", "db": "BID", "id": "106996" }, { "date": "2019-02-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-012408" }, { "date": "2021-05-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-605" }, { "date": "2024-11-21T04:05:50.857000", "db": "NVD", "id": "CVE-2018-3657" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-605" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel CSME Firmware buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-012408" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-605" } ], "trust": 0.6 } }
var-201805-0963
Vulnerability from variot
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. CPU hardware utilizing speculative execution may be vulnerable to cache timing side-channel analysis. Two vulnerabilities are identified, known as "Variant 3a" and "Variant 4". CPUhardware is firmware that runs in the central processor for managing and controlling the CPU. Multiple CPUHardware information disclosure vulnerabilities. The vulnerability is caused by a race condition in the CPU cache processing. Local attackers can exploit vulnerabilities to obtain sensitive information through side channel analysis. AMD, ARM, and Intel CPUs are all CPU (central processing unit) products from different manufacturers. AMD, ARM, and Intel CPUs have security vulnerabilities. 7) - aarch64, noarch, ppc64le
-
(CVE-2018-3639, aarch64)
-
A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390)
-
A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391)
Space precludes documenting all of the security fixes in this advisory. See the descriptions of the remaining security fixes in the related Knowledge Article:
https://access.redhat.com/articles/3658021
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. 1623067 - CVE-2018-9363 kernel: Buffer overflow in hidp_process_report 1629636 - CVE-2018-14641 kernel: a bug in ip_frag_reasm() can cause a crash in ip_do_fragment()
-
(CVE-2018-3639, PowerPC)
-
kernel: net/packet: overflow in check for priv area size (CVE-2017-7308)
-
kernel: AIO interface didn't use rw_verify_area() for checking mandatory locking on files and size of access (CVE-2012-6701)
-
kernel: AIO write triggers integer overflow in some protocols (CVE-2015-8830)
-
kernel: Null pointer dereference via keyctl (CVE-2016-8650)
-
kernel: ping socket / AF_LLC connect() sin_family race (CVE-2017-2671)
-
kernel: Race condition between multiple sys_perf_event_open() calls (CVE-2017-6001)
-
kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c (CVE-2017-7616)
-
kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism (CVE-2017-7889)
-
kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c (CVE-2017-8890)
-
kernel: net: sctp_v6_create_accept_sk function mishandles inheritance (CVE-2017-9075)
-
kernel: net: IPv6 DCCP implementation mishandles inheritance (CVE-2017-9076)
-
kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance (CVE-2017-9077)
-
kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190)
-
kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121)
-
kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203)
-
kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash (CVE-2018-1130)
-
kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service (CVE-2018-5803)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Bugs fixed (https://bugzilla.redhat.com/):
869942 - Kernel crashes on reading an ACL containing 190 ACEs over NFSv4 1314275 - CVE-2015-8830 kernel: AIO write triggers integer overflow in some protocols 1314288 - CVE-2012-6701 kernel: AIO interface didn't use rw_verify_area() for checking mandatory locking on files and size of access 1395187 - CVE-2016-8650 kernel: Null pointer dereference via keyctl 1422825 - CVE-2017-6001 kernel: Race condition between multiple sys_perf_event_open() calls 1436649 - CVE-2017-2671 kernel: ping socket / AF_LLC connect() sin_family race 1437404 - CVE-2017-7308 kernel: net/packet: overflow in check for priv area size 1441088 - CVE-2017-7616 kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c 1444493 - CVE-2017-7889 kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism 1448170 - RHEL6.9: sunrpc reconnect logic now may trigger a SYN storm when a TCP connection drops and a burst of RPC commands hit the transport 1450972 - CVE-2017-8890 kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c 1452688 - CVE-2017-9076 kernel: net: IPv6 DCCP implementation mishandles inheritance 1452691 - CVE-2017-9075 kernel: net: sctp_v6_create_accept_sk function mishandles inheritance 1452744 - CVE-2017-9077 kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance 1495089 - CVE-2017-12190 kernel: memory leak when merging buffers in SCSI IO vectors 1497152 - systool causes panic on 2.6.32-696.6.3.el6.x86_64 using be2iscsi 1520893 - CVE-2017-15121 kernel: vfs: BUG in truncate_inode_pages_range() and fuse client 1550811 - CVE-2017-18203 kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service 1551051 - CVE-2018-5803 kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service 1560494 - i686: Using invpcid_flush_all_nonglobals() can cause user-space panic on .i686 1566890 - CVE-2018-3639 hw: cpu: speculative store bypass 1576419 - CVE-2018-1130 kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash
-
7) - aarch64, noarch, ppc64le, s390x
-
Description:
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. (CVE-2018-3639)
Note: This is the OpenJDK side of the CVE-2018-3639 mitigation.
The following packages have been upgraded to a later upstream version: rhevm-setup-plugins (3.6.7). Description:
KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.
Bug Fix(es):
-
Previously, using device passthrough for a SCSI-2 device failed and returned an "Illegal Request" error. With this update, the QEMU emulator checks the SCSI version of the device when performing passthrough. (BZ#1571370)
-
Under certain circumstances, resuming a paused guest generated redundant "VIR_DOMAIN_PAUSED_UNKNOWN" error messages in the libvirt log. This update corrects the event sending order when resuming guests, which prevents the errors being logged. (BZ#1588001)
-
Once all virtual machines have shut down, start them again for this update to take effect. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel security and bug fix update Advisory ID: RHSA-2018:2161-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2018:2161 Issue date: 2018-07-10 CVE Names: CVE-2018-3639 ==================================================================== 1. Summary:
An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux ComputeNode EUS (v. 7.3) - noarch, x86_64 Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3) - x86_64 Red Hat Enterprise Linux Server EUS (v. 7.3) - noarch, ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Server Optional EUS (v. 7.3) - ppc64, ppc64le, x86_64
- Description:
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
- An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, x86 AMD)
Red Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.
Bug Fix(es):
-
When a Nonvolatile Memory Express (NVMe) namespace was created, changed, or deleted, an occasional deadlock occurred. With this update, namespace scanning and removal does not hold a mutual exclusion (mutex) program object. As a result, a deadlock no longer occurs in the described scenario. (BZ#1566886)
-
Previously, a live migration of a virtual machine from one host with updated firmware to another host without updated firmware resulted in incorrect kernel settings for Meltdown mitigations, which could leave the kernel vulnerable to Meltdown. With this fix, the firmware on the new physical host is re-scanned for updates after a live migration. As a result, the kernel uses the correct mitigation in the described scenario. (BZ#1570507)
-
Previously, microcode updates on 32 and 64-bit AMD and Intel architectures were not synchronized. As a consequence, it was not possible to apply the microcode updates. This fix adds the synchronization to the microcode updates so that processors of the stated architectures receive updates at the same time. As a result, microcode updates are now synchronized. (BZ#1578044)
-
When switching from the indirect branch speculation (IBRS) feature to the retpolines feature, the IBRS state of some CPUs was sometimes not handled correctly. Consequently, some CPUs were left with the IBRS Model-Specific Register (MSR) bit set to 1, which could lead to performance issues. With this update, the underlying source code has been fixed to clear the IBRS MSR bits correctly, thus fixing the bug. (BZ#1586146)
Users of kernel are advised to upgrade to these updated packages, which fix these bugs.
The system must be rebooted for this update to take effect.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1566890 - CVE-2018-3639 hw: cpu: speculative store bypass
- Package List:
Red Hat Enterprise Linux ComputeNode EUS (v. 7.3):
Source: kernel-3.10.0-514.53.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-514.53.1.el7.noarch.rpm kernel-doc-3.10.0-514.53.1.el7.noarch.rpm
x86_64: kernel-3.10.0-514.53.1.el7.x86_64.rpm kernel-debug-3.10.0-514.53.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-514.53.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.53.1.el7.x86_64.rpm kernel-devel-3.10.0-514.53.1.el7.x86_64.rpm kernel-headers-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-514.53.1.el7.x86_64.rpm perf-3.10.0-514.53.1.el7.x86_64.rpm perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm python-perf-3.10.0-514.53.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm
Red Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3):
x86_64: kernel-debug-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-514.53.1.el7.x86_64.rpm perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server EUS (v. 7.3):
Source: kernel-3.10.0-514.53.1.el7.src.rpm
noarch: kernel-abi-whitelists-3.10.0-514.53.1.el7.noarch.rpm kernel-doc-3.10.0-514.53.1.el7.noarch.rpm
ppc64: kernel-3.10.0-514.53.1.el7.ppc64.rpm kernel-bootwrapper-3.10.0-514.53.1.el7.ppc64.rpm kernel-debug-3.10.0-514.53.1.el7.ppc64.rpm kernel-debug-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm kernel-debug-devel-3.10.0-514.53.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-514.53.1.el7.ppc64.rpm kernel-devel-3.10.0-514.53.1.el7.ppc64.rpm kernel-headers-3.10.0-514.53.1.el7.ppc64.rpm kernel-tools-3.10.0-514.53.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm kernel-tools-libs-3.10.0-514.53.1.el7.ppc64.rpm perf-3.10.0-514.53.1.el7.ppc64.rpm perf-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm python-perf-3.10.0-514.53.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm
ppc64le: kernel-3.10.0-514.53.1.el7.ppc64le.rpm kernel-bootwrapper-3.10.0-514.53.1.el7.ppc64le.rpm kernel-debug-3.10.0-514.53.1.el7.ppc64le.rpm kernel-debug-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-514.53.1.el7.ppc64le.rpm kernel-devel-3.10.0-514.53.1.el7.ppc64le.rpm kernel-headers-3.10.0-514.53.1.el7.ppc64le.rpm kernel-tools-3.10.0-514.53.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm kernel-tools-libs-3.10.0-514.53.1.el7.ppc64le.rpm perf-3.10.0-514.53.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm python-perf-3.10.0-514.53.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm
s390x: kernel-3.10.0-514.53.1.el7.s390x.rpm kernel-debug-3.10.0-514.53.1.el7.s390x.rpm kernel-debug-debuginfo-3.10.0-514.53.1.el7.s390x.rpm kernel-debug-devel-3.10.0-514.53.1.el7.s390x.rpm kernel-debuginfo-3.10.0-514.53.1.el7.s390x.rpm kernel-debuginfo-common-s390x-3.10.0-514.53.1.el7.s390x.rpm kernel-devel-3.10.0-514.53.1.el7.s390x.rpm kernel-headers-3.10.0-514.53.1.el7.s390x.rpm kernel-kdump-3.10.0-514.53.1.el7.s390x.rpm kernel-kdump-debuginfo-3.10.0-514.53.1.el7.s390x.rpm kernel-kdump-devel-3.10.0-514.53.1.el7.s390x.rpm perf-3.10.0-514.53.1.el7.s390x.rpm perf-debuginfo-3.10.0-514.53.1.el7.s390x.rpm python-perf-3.10.0-514.53.1.el7.s390x.rpm python-perf-debuginfo-3.10.0-514.53.1.el7.s390x.rpm
x86_64: kernel-3.10.0-514.53.1.el7.x86_64.rpm kernel-debug-3.10.0-514.53.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-514.53.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.53.1.el7.x86_64.rpm kernel-devel-3.10.0-514.53.1.el7.x86_64.rpm kernel-headers-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-514.53.1.el7.x86_64.rpm perf-3.10.0-514.53.1.el7.x86_64.rpm perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm python-perf-3.10.0-514.53.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm
Red Hat Enterprise Linux Server Optional EUS (v. 7.3):
ppc64: kernel-debug-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm kernel-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm kernel-debuginfo-common-ppc64-3.10.0-514.53.1.el7.ppc64.rpm kernel-tools-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm kernel-tools-libs-devel-3.10.0-514.53.1.el7.ppc64.rpm perf-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm python-perf-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm
ppc64le: kernel-debug-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm kernel-debug-devel-3.10.0-514.53.1.el7.ppc64le.rpm kernel-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm kernel-debuginfo-common-ppc64le-3.10.0-514.53.1.el7.ppc64le.rpm kernel-tools-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm kernel-tools-libs-devel-3.10.0-514.53.1.el7.ppc64le.rpm perf-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm python-perf-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm
x86_64: kernel-debug-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-514.53.1.el7.x86_64.rpm perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2018-3639 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBW0Tt1NzjgjWX9erEAQjWjRAAqEnkLg83IXcDh/QVNDhAoM5gAh+OkfHJ LiuDz6CIHgDiv9K3BiG/dLNgL5caK11pxryqk/9kmtgoy6ClyqcrA2FNRIJMwugr PXTjAXNxekyn6gTX0I+8hSOulCZtkCRXmlUu79apvVT/eqQM6PfqjK02OjEL9uc8 59jO7ZoWcv7GVJhu+06QoHaWAqGHBOYL9ufCVAXZH6dY3aS2dPM4UUcZpVxsP8X/ HqXR/ciyXNPSQoGcR/waf/iZgx1pDIV6JXmdl/qlJXthohwa1ZwxD2qqEV3cM9uO XzXXVu9SD2D8cU4jClzIZ+XfM9J9dNl8j2YbZHaUs5IADNwqAIjPTb5leNhe6jqv omnbgOwkJ0mEOLeWBSpQhGxoq4rk4eUJLai1kcpw8MRa6RzOzTs+GHOxTpDfL681 S7F8GjN6J4l0gbW+fOkley3gdMi/74cZcWA6jX/GcjJrtzhlFhRsUDZqd8Eb+F/g quqdBLQ9Vc81FRlMoCATOhuqHM1/eJUcySbY3r1A6bU9oUQShN+prvIV4z5/ag6o WIPN2ImSDaSBACJoCSEby8e2jXs689JLHgPPS0QVvuMQK7wdYGu8/7W++L7+5/It IkS2XQFetG9urfkgM/OMVzeybOiGVsai+JAJOTxFnTWPeyIFF5MJ2E31Q11Amdlp YF80GD/Rvjo=ltf/ -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . Relevant releases/architectures:
RHV-M 4.3 - noarch
- It includes the configuration of the Red Hat Support plugin, copying downstream-only artifacts to the ISO domain, and links to the knowledgebase and other support material. There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue. (CVE-2017-5754)
Bug Fix(es):
-
[CVE-2017-5754] Variant3: POWER {qemu-kvm-rhev} Add machine type variants (BZ#1559948)
-
add POWER 9 to the 4.2 cluster level (BZ#1574494)
-
6.6) - x86_64
-
Description:
The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201805-0963", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c3808" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c3508" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c3538" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c3558" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c3708" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c3750" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c3758" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c2308" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c3308" }, { "model": "atom c", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": "c3338" }, { "model": "xeon e5 2650l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v4" }, { "model": "xeon e3 1240l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v4" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4660_v3" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.6" }, { "model": "xeon e5 2430l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1240 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860_v3" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3736g" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v3" }, { "model": "xeon e3 1225 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "45nm" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3775" }, { "model": "windows 10", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "1809" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86130t" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3850" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86126t" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1545m_v5" }, { "model": "xeon e5 2637", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4807" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "15" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3480" }, { "model": "simatic ipc827d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.02.11" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3745" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3580" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3480" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v3" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5504" }, { "model": "xeon e3 1278l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830" }, { "model": "simatic ipc427e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.09" }, { "model": "windows 7", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880l_v2" }, { "model": "jetson tx2", "scope": "lt", "trust": 1.0, "vendor": "nvidia", "version": "r28.3" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160" }, { "model": "xeon e3 1265l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2430 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1280 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4109t" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4667_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v2" }, { "model": "xeon e5 2603 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "57" }, { "model": "xeon e5 2620 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5507" }, { "model": "xeon e3 1281 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660" }, { "model": "xeon e5 2450l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v2" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "17.10" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735d" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867l" }, { "model": "xeon e5 2630 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "windows server 2012", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8180" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2650l_v4" }, { "model": "xeon e3 1225 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2420", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v2" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "xeon e5 2648l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v3" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j3455" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w5580" }, { "model": "mivoice border gateway", "scope": "eq", "trust": 1.0, "vendor": "mitel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86134m" }, { "model": "surface", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "mivoic mx-one", "scope": "eq", "trust": 1.0, "vendor": "mitel", "version": null }, { "model": "xeon e5 2438l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2480" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86144" }, { "model": "xeon e5 2470 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x5-e3930", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc547e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "r1.30.0" }, { "model": "windows server 2016", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "1803" }, { "model": "xeon e5 2407 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2450 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2609 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "windows server 2008", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "sp2" }, { "model": "xeon e5 2609 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v3" }, { "model": "simatic ipc647c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "15.01.14" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v3" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5508_" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1515m_v5" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86126" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86132" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640" }, { "model": "xeon e3 1245", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2418l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2643 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86142m" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v2" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1535m_v5" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v2" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "85120" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "3600" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86134" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "85120t" }, { "model": "pentium silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n5000" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3785" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5550" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4114" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3827" }, { "model": "simatic ipc827c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "15.02.15" }, { "model": "xeon e5 1428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670_v3" }, { "model": "xeon e5 2430", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4890_v2" }, { "model": "xeon e5 2428l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2640 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667" }, { "model": "xeon e5 2618l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2643 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4603_v2" }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4105" }, { "model": "simatic ipc427d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "17.0x.14" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4880_v2" }, { "model": "itc1500 pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176f" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1565l_v5" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4648_v3" }, { "model": "xeon e5 1660 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ruggedcom ape", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8857_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8837" }, { "model": "xeon e5 2620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1505l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4628l_v4" }, { "model": "xeon e5 2618l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "85115" }, { "model": "solaris", "scope": "eq", "trust": 1.0, "vendor": "oracle", "version": "11" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4603" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2665" }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "32nm" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v2" }, { "model": "xeon e5 2630 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v4" }, { "model": "xeon e3 1265l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 1650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v2" }, { "model": "pentium silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j5005" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3570" }, { "model": "xeon e5 1680 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3560" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2850" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.2" }, { "model": "sonicosv", "scope": "eq", "trust": 1.0, "vendor": "sonicwall", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v2" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5520" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160f" }, { "model": "email security", "scope": "eq", "trust": 1.0, "vendor": "sonicwall", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v4" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4624l_v2" }, { "model": "xeon e5 1650 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1268l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650_v4" }, { "model": "openstack", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "9" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2520" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "85119t" }, { "model": "xeon e5 2608l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "itc2200", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2803" }, { "model": "xeon e5 2643 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4607_v2" }, { "model": "xeon e5 1620 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "secure mobile access", "scope": "eq", "trust": 1.0, "vendor": "sonicwall", "version": null }, { "model": "xeon e5 2637 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3770" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4607" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3955" }, { "model": "xeon e3 1270 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3530" }, { "model": "xeon e5 2630l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2460" }, { "model": "xeon e3 1220 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1230 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86146" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5506" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8158" }, { "model": "simatic ipc677d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.02.11" }, { "model": "cloud global management system", "scope": "eq", "trust": 1.0, "vendor": "sonicwall", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v2" }, { "model": "core i7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "32nm" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1585l_v5" }, { "model": "xeon e5 2408l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4116t" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "xeon e5 1650 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "surface pro with lte advanced", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "1807" }, { "model": "windows server 2016", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "simatic ipc477e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.09" }, { "model": "xeon e3 1275 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v2" }, { "model": "xeon e3 1240 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4655_v4" }, { "model": "simatic ipc847c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "15.01.14" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5560" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v2" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.5" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3845" }, { "model": "xeon e3 1280 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "18.04" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650" }, { "model": "xeon e5 2637 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2820" }, { "model": "mivoice business", "scope": "eq", "trust": 1.0, "vendor": "mitel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870_v2" }, { "model": "xeon e5 2630l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8168" }, { "model": "xeon e3 1241 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86142" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160m" }, { "model": "xeon e3 1230l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1260l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "virtualization manager", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "4.3" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4655_v3" }, { "model": "xeon e3 1225", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "windows 10", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "1709" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v3" }, { "model": "xeon e3 1271 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1260l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "itc2200 pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "xeon e3 1245 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5506" }, { "model": "xeon e5 1650 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2760" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l3406" }, { "model": "xeon e3 1245 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1275 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1230", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "jetson tx1", "scope": "lt", "trust": 1.0, "vendor": "nvidia", "version": "r28.3" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l3403" }, { "model": "xeon e5 2623 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v2" }, { "model": "xeon e3 1240 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658" }, { "model": "xeon e3 1285 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3440" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w_v3" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3460" }, { "model": "xeon e5 2628l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2698_v3" }, { "model": "xeon e5 2630 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86128" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86148f" }, { "model": "local service management system", "scope": "gte", "trust": 1.0, "vendor": "oracle", "version": "13.0" }, { "model": "pentium", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4000" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "45nm" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3590" }, { "model": "xeon e5 1428l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "micloud management portal", "scope": "eq", "trust": 1.0, "vendor": "mitel", "version": "*" }, { "model": "surface pro", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "1796" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v3" }, { "model": "xeon e5 2448l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2428l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3745d" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "struxureware data center expert", "scope": "lt", "trust": 1.0, "vendor": "schneider electric", "version": "7.6.0" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2560" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2860" }, { "model": "xeon e5 2637 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v3" }, { "model": "xeon e3 1285l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3958" }, { "model": "simatic ipc547g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "r1.23.0" }, { "model": "xeon e5 2418l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3805" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3825" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3770d" }, { "model": "windows 10", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "1607" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2850_v2" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8153" }, { "model": "xeon e5 2603 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.6" }, { "model": "micollab", "scope": "eq", "trust": 1.0, "vendor": "mitel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8170" }, { "model": "xeon e3 1286l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 1660 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4100" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5115" }, { "model": "xeon e3 12201 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1280", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2640 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2643", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2620 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "windows server 2008", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "r2" }, { "model": "virtualization", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "4.0" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8893_v4" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5503" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4830_v2" }, { "model": "xeon e3 1285 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4005" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3826" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v4" }, { "model": "xeon e3 1225 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "windows 10", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "1703" }, { "model": "xeon e3 1240l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3460" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v2" }, { "model": "atom x7-e3950", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2430l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2667_v3" }, { "model": "openstack", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "12" }, { "model": "xeon e5 2448l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2407", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v3" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v2" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3430" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867_v3" }, { "model": "xeon e3 1270 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1268l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86138f" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v3" }, { "model": "xeon e3 1501m v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2618l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2670_v2" }, { "model": "xeon e3 1220 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3470" }, { "model": "xeon e5 2603 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc477e pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.09" }, { "model": "xeon e3 1245 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2450l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4860" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8160t" }, { "model": "xeon e3 1225 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 1620 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4112" }, { "model": "xeon e3 1276 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1558l_v5" }, { "model": "xeon e3 1505m v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4108" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.6" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "12.04" }, { "model": "web application firewall", "scope": "eq", "trust": 1.0, "vendor": "sonicwall", "version": null }, { "model": "xeon e5 2650l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699r_v4" }, { "model": "atom e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e3815" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2698_v4" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5518_" }, { "model": "xeon e5 1620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "w5590" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610" }, { "model": "xeon e3 1220l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1230 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v3" }, { "model": "xeon e3 1235l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1578l_v5" }, { "model": "xeon e3 1226 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1535m_v6" }, { "model": "xeon e5 1428l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.4" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3740d" }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "45nm" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2687w" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v4" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "125c_" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86142f" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86154" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870_v4" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8164" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658a_v3" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690" }, { "model": "xeon e5 2648l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2603", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1275 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v3" }, { "model": "sinema remote connect", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86140" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.7" }, { "model": "xeon e5 2628l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4116" }, { "model": "xeon e3 1285 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4669_v4" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86138" }, { "model": "openstack", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "8" }, { "model": "xeon e3 12201", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2660_v4" }, { "model": "xeon e5 2418l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic field pg m5", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "22.01.06" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v3" }, { "model": "simatic ipc677c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "15.02.15" }, { "model": "surface pro", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "3" }, { "model": "xeon e5 1630 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "45nm" }, { "model": "xeon e5 2450", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86136" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699a_v4" }, { "model": "xeon e5 2403", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "openstack", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "13" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e6550" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.2" }, { "model": "windows server 2016", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "1709" }, { "model": "xeon e3 1270 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "8.0" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1585_v5" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735g" }, { "model": "xeon e5 2403 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1501l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2440", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v2" }, { "model": "pentium j", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "j4205" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2580" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735e" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8830" }, { "model": "surface book", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1220_" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v4" }, { "model": "surface studio", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3950" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697a_v4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2870_v2" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4870" }, { "model": "simatic ipc847d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.01.14" }, { "model": "xeon e3 1245 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v3" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "7500" }, { "model": "xeon e5 1630 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3736f" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4667_v4" }, { "model": "itc1900 pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "xeon e5 2470", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "openstack", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "10" }, { "model": "surface pro", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "4" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v3" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4640_v4" }, { "model": "xeon e5 2648l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "sinumerik pcu 50.5", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "15.02.15" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2683_v3" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5530" }, { "model": "xeon e3 1220 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-1105c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "sinumerik 840 d sl", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "xeon e3 1258l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4620_v4" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4669_v3" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3740" }, { "model": "simatic itp1000", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "23.01.04" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3858" }, { "model": "xeon e3 1235", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4650l" }, { "model": "xeon e3 1270 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simotion p320-4e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "17.0x.14" }, { "model": "xeon e5 2640 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1575m_v5" }, { "model": "xeon e3 1220 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8890_v4" }, { "model": "xeon e5 2609 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x3450" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8860" }, { "model": "simatic ipc477c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l3426" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86152" }, { "model": "enterprise linux server", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "5.9" }, { "model": "xeon e5 1620 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2630l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1275_" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5540" }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4110" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2890_v2" }, { "model": "xeon e5 1660 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2699_v4" }, { "model": "open integration gateway", "scope": "eq", "trust": 1.0, "vendor": "mitel", "version": null }, { "model": "xeon e3 1240 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc477d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "17.0x.14" }, { "model": "simatic et 200 sp", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.6" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8891_v3" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.4" }, { "model": "xeon e5 2420 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86130" }, { "model": "windows 10", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "1803" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8850_v2" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176m" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86140m" }, { "model": "xeon e3 1265l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3775d" }, { "model": "xeon e3 1246 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "virtualization manager", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "4.2" }, { "model": "local service management system", "scope": "lte", "trust": 1.0, "vendor": "oracle", "version": "13.3" }, { "model": "xeon e3 1275l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86148" }, { "model": "xeon e5 2623 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4809_v4" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4657l_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2690_v4" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z2420" }, { "model": "openstack", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.0" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880l_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8850" }, { "model": "xeon e3 1275 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom x5-e3940", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1285l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8867_v4" }, { "model": "xeon e3 1280 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86138t" }, { "model": "simatic ipc427c", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "core i3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "32nm" }, { "model": "simatic ipc347e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.5" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e6510" }, { "model": "atom c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "c3830" }, { "model": "xeon e5 1660", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2428l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "sinumerik tcu 30.3", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "mivoice connect", "scope": "eq", "trust": 1.0, "vendor": "mitel", "version": null }, { "model": "windows 8.1", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "xeon e5 2630", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc627d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.02.11" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8880_v3" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v4" }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "windows server 2012", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "r2" }, { "model": "xeon e3 1230 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic s7-1500", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "2.6" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2695_v4" }, { "model": "xeon e5 2440 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4850_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680_v4" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.5" }, { "model": "mivoice 5000", "scope": "eq", "trust": 1.0, "vendor": "mitel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "1505m_v6" }, { "model": "itc1500", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "xeon e5 2648l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "85122" }, { "model": "xeon e3 1290 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 1680 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1125c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8170m" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4820_v4" }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8156" }, { "model": "xeon e3 1231 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon platinum", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8176" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2830" }, { "model": "xeon e3 1505l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2628l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8870" }, { "model": "cortex-a", "scope": "eq", "trust": 1.0, "vendor": "arm", "version": "72" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "8894_v4" }, { "model": "xeon e3 1230 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2609", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2650 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2870" }, { "model": "simatic ipc3000 smart", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.5" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2680" }, { "model": "xeon e5 2640", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5502" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4617" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e6540" }, { "model": "simatic ipc647d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.01.14" }, { "model": "xeon e3 1280 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1270", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n4200" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "e5530" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4610_v3" }, { "model": "xeon e3 1105c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon silver", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4114t" }, { "model": "simatic field pg m4", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "18.01.09" }, { "model": "itc1900", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "3.1" }, { "model": "simatic ipc627c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "15.02.15" }, { "model": "core m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "32nm" }, { "model": "global management system", "scope": "eq", "trust": 1.0, "vendor": "sonicwall", "version": null }, { "model": "xeon e3 1286 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3 1290", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron n", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "n3450" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2658_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4660_v4" }, { "model": "enterprise linux server aus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "7.3" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "x5570" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86150" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "l5520" }, { "model": "mrg realtime", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "2.0" }, { "model": "xeon e7", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2880_v2" }, { "model": "windows 10", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": null }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2697_v2" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "4627_v3" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.0" }, { "model": "xeon e3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "5600" }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3795" }, { "model": "enterprise linux eus", "scope": "eq", "trust": 1.0, "vendor": "redhat", "version": "6.7" }, { "model": "xeon e5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "2683_v4" }, { "model": "xeon e3 1240", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e5 2620 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "surface book", "scope": "eq", "trust": 1.0, "vendor": "microsoft", "version": "2" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86130f" }, { "model": "xeon e5 2608l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "atom z", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "z3735f" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "86126f" }, { "model": "xeon gold", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "85118" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "amd", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "arm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "apple", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "dell", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "dell emc", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "fortinet", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hp", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ibm", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "qualcomm incorporated", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "red hat", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "suse linux", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "synology", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ubuntu", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": "cortex a57", "scope": null, "trust": 0.6, "vendor": "arm", "version": null }, { "model": "5th generation core processors", "scope": null, "trust": 0.6, "vendor": "intel", "version": null }, { "model": "cortex a72", "scope": null, "trust": 0.6, "vendor": "arm", "version": null }, { "model": "6th generation core processors", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "5th generation core processors", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "4th generation core processors", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "3rd generation core processors", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "2nd generation core processors", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "8th generation core processors", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "7th generation core processors", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "atom processor a series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "atom processor c series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "atom processor e series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "atom processor t series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "atom processor series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "x0" }, { "model": "atom processor z series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "core x-series processor family for intel platforms", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "x990" }, { "model": "celeron processor j series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "celeron processor n series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "core m processor family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "core x-series processor family for intel platforms", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "x2990" }, { "model": "pentium processor n series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "pentium processor silver series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "xeon processor series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "34000" }, { "model": "xeon processor series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "36000" }, { "model": "xeon processor series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "55000" }, { "model": "xeon processor series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "56000" }, { "model": "xeon processor series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "75000" }, { "model": "xeon processor series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "65000" }, { "model": "pentium processor j series", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v20" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v3" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v40" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v50" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v60" }, { "model": "xeon processor e5 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "xeon processor e5 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v20" }, { "model": "xeon processor e5 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v3" }, { "model": "xeon processor e5 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v40" }, { "model": "xeon processor e7 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "0" }, { "model": "xeon processor e7 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v20" }, { "model": "xeon processor e7 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v3" }, { "model": "xeon processor e7 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v40" } ], "sources": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-13391" }, { "db": "CNNVD", "id": "CNNVD-201805-749" }, { "db": "NVD", "id": "CVE-2018-3639" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "147778" }, { "db": "PACKETSTORM", "id": "150070" }, { "db": "PACKETSTORM", "id": "148244" }, { "db": "PACKETSTORM", "id": "151288" }, { "db": "PACKETSTORM", "id": "150075" }, { "db": "PACKETSTORM", "id": "147738" }, { "db": "PACKETSTORM", "id": "147758" }, { "db": "PACKETSTORM", "id": "148330" }, { "db": "PACKETSTORM", "id": "148484" }, { "db": "PACKETSTORM", "id": "152767" }, { "db": "PACKETSTORM", "id": "150077" }, { "db": "PACKETSTORM", "id": "147748" } ], "trust": 1.2 }, "cve": "CVE-2018-3639", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2018-3639", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2018-13391", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-133670", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "VHN-133671", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2018-3639", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-3639", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2018-13391", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201805-749", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-133670", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-133671", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-13391" }, { "db": "VULHUB", "id": "VHN-133670" }, { "db": "VULHUB", "id": "VHN-133671" }, { "db": "CNNVD", "id": "CNNVD-201805-749" }, { "db": "NVD", "id": "CVE-2018-3639" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. CPU hardware utilizing speculative execution may be vulnerable to cache timing side-channel analysis. Two vulnerabilities are identified, known as \"Variant 3a\" and \"Variant 4\". CPUhardware is firmware that runs in the central processor for managing and controlling the CPU. Multiple CPUHardware information disclosure vulnerabilities. The vulnerability is caused by a race condition in the CPU cache processing. Local attackers can exploit vulnerabilities to obtain sensitive information through side channel analysis. AMD, ARM, and Intel CPUs are all CPU (central processing unit) products from different manufacturers. AMD, ARM, and Intel CPUs have security vulnerabilities. 7) - aarch64, noarch, ppc64le\n\n3. (CVE-2018-3639, aarch64)\n\n* A flaw named SegmentSmack was found in the way the Linux kernel handled\nspecially crafted TCP packets. A remote attacker could use this flaw to\ntrigger time and calculation expensive calls to tcp_collapse_ofo_queue()\nand tcp_prune_ofo_queue() functions by sending specially modified packets\nwithin ongoing TCP sessions which could lead to a CPU saturation and hence\na denial of service on the system. Maintaining the denial of service\ncondition requires continuous two-way TCP sessions to a reachable open\nport, thus the attacks cannot be performed using spoofed IP addresses. \n(CVE-2018-5390)\n\n* A flaw named FragmentSmack was found in the way the Linux kernel handled\nreassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use\nthis flaw to trigger time and calculation expensive fragment reassembly\nalgorithm by sending specially crafted packets which could lead to a CPU\nsaturation and hence a denial of service on the system. (CVE-2018-5391)\n\nSpace precludes documenting all of the security fixes in this advisory. See\nthe descriptions of the remaining security fixes in the related Knowledge\nArticle:\n\nhttps://access.redhat.com/articles/3658021\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. \n1623067 - CVE-2018-9363 kernel: Buffer overflow in hidp_process_report\n1629636 - CVE-2018-14641 kernel: a bug in ip_frag_reasm() can cause a crash in ip_do_fragment()\n\n6. (CVE-2018-3639, PowerPC)\n\n* kernel: net/packet: overflow in check for priv area size (CVE-2017-7308)\n\n* kernel: AIO interface didn\u0027t use rw_verify_area() for checking mandatory\nlocking on files and size of access (CVE-2012-6701)\n\n* kernel: AIO write triggers integer overflow in some protocols\n(CVE-2015-8830)\n\n* kernel: Null pointer dereference via keyctl (CVE-2016-8650)\n\n* kernel: ping socket / AF_LLC connect() sin_family race (CVE-2017-2671)\n\n* kernel: Race condition between multiple sys_perf_event_open() calls\n(CVE-2017-6001)\n\n* kernel: Incorrect error handling in the set_mempolicy and mbind compat\nsyscalls in mm/mempolicy.c (CVE-2017-7616)\n\n* kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM\nprotection mechanism (CVE-2017-7889)\n\n* kernel: Double free in the inet_csk_clone_lock function in\nnet/ipv4/inet_connection_sock.c (CVE-2017-8890)\n\n* kernel: net: sctp_v6_create_accept_sk function mishandles inheritance\n(CVE-2017-9075)\n\n* kernel: net: IPv6 DCCP implementation mishandles inheritance\n(CVE-2017-9076)\n\n* kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance\n(CVE-2017-9077)\n\n* kernel: memory leak when merging buffers in SCSI IO vectors\n(CVE-2017-12190)\n\n* kernel: vfs: BUG in truncate_inode_pages_range() and fuse client\n(CVE-2017-15121)\n\n* kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows\nlocal users to cause a denial of service (CVE-2017-18203)\n\n* kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit()\nleads to a system crash (CVE-2018-1130)\n\n* kernel: Missing length check of payload in\nnet/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of\nservice (CVE-2018-5803)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. Bugs fixed (https://bugzilla.redhat.com/):\n\n869942 - Kernel crashes on reading an ACL containing 190 ACEs over NFSv4\n1314275 - CVE-2015-8830 kernel: AIO write triggers integer overflow in some protocols\n1314288 - CVE-2012-6701 kernel: AIO interface didn\u0027t use rw_verify_area() for checking mandatory locking on files and size of access\n1395187 - CVE-2016-8650 kernel: Null pointer dereference via keyctl\n1422825 - CVE-2017-6001 kernel: Race condition between multiple sys_perf_event_open() calls\n1436649 - CVE-2017-2671 kernel: ping socket / AF_LLC connect() sin_family race\n1437404 - CVE-2017-7308 kernel: net/packet: overflow in check for priv area size\n1441088 - CVE-2017-7616 kernel: Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c\n1444493 - CVE-2017-7889 kernel: mm subsystem does not properly enforce the CONFIG_STRICT_DEVMEM protection mechanism\n1448170 - RHEL6.9: sunrpc reconnect logic now may trigger a SYN storm when a TCP connection drops and a burst of RPC commands hit the transport\n1450972 - CVE-2017-8890 kernel: Double free in the inet_csk_clone_lock function in net/ipv4/inet_connection_sock.c\n1452688 - CVE-2017-9076 kernel: net: IPv6 DCCP implementation mishandles inheritance\n1452691 - CVE-2017-9075 kernel: net: sctp_v6_create_accept_sk function mishandles inheritance\n1452744 - CVE-2017-9077 kernel: net: tcp_v6_syn_recv_sock function mishandles inheritance\n1495089 - CVE-2017-12190 kernel: memory leak when merging buffers in SCSI IO vectors\n1497152 - systool causes panic on 2.6.32-696.6.3.el6.x86_64 using be2iscsi\n1520893 - CVE-2017-15121 kernel: vfs: BUG in truncate_inode_pages_range() and fuse client\n1550811 - CVE-2017-18203 kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service\n1551051 - CVE-2018-5803 kernel: Missing length check of payload in net/sctp/sm_make_chunk.c:_sctp_make_chunk() function allows denial of service\n1560494 - i686: Using invpcid_flush_all_nonglobals() can cause user-space panic on .i686\n1566890 - CVE-2018-3639 hw: cpu: speculative store bypass\n1576419 - CVE-2018-1130 kernel: a null pointer dereference in net/dccp/output.c:dccp_write_xmit() leads to a system crash\n\n6. 7) - aarch64, noarch, ppc64le, s390x\n\n3. Description:\n\nThe java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime\nEnvironment and the OpenJDK 8 Java Software Development Kit. (CVE-2018-3639)\n\nNote: This is the OpenJDK side of the CVE-2018-3639 mitigation. \n\nThe following packages have been upgraded to a later upstream version:\nrhevm-setup-plugins (3.6.7). Description:\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on a variety of architectures. The qemu-kvm-rhev packages provide the\nuser-space component for running virtual machines that use KVM in\nenvironments managed by Red Hat products. \n\nBug Fix(es):\n\n* Previously, using device passthrough for a SCSI-2 device failed and\nreturned an \"Illegal Request\" error. With this update, the QEMU emulator\nchecks the SCSI version of the device when performing passthrough. (BZ#1571370)\n \n* Under certain circumstances, resuming a paused guest generated redundant\n\"VIR_DOMAIN_PAUSED_UNKNOWN\" error messages in the libvirt log. This update\ncorrects the event sending order when resuming guests, which prevents the\nerrors being logged. (BZ#1588001)\n\n4. Once\nall virtual machines have shut down, start them again for this update to\ntake effect. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: kernel security and bug fix update\nAdvisory ID: RHSA-2018:2161-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2018:2161\nIssue date: 2018-07-10\nCVE Names: CVE-2018-3639\n====================================================================\n1. Summary:\n\nAn update for kernel is now available for Red Hat Enterprise Linux 7.3\nExtended Update Support. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.3) - noarch, x86_64\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3) - x86_64\nRed Hat Enterprise Linux Server EUS (v. 7.3) - noarch, ppc64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux Server Optional EUS (v. 7.3) - ppc64, ppc64le, x86_64\n\n3. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. \n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of Load \u0026 Store instructions\n(a commonly used performance optimization). It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well as\nthe fact that memory read from address to which a recent memory write has\noccurred may see an older value and subsequently cause an update into the\nmicroprocessor\u0027s data cache even for speculatively executed instructions\nthat never actually commit (retire). As a result, an unprivileged attacker\ncould use this flaw to read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2018-3639, x86 AMD)\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue. \n\nBug Fix(es):\n\n* When a Nonvolatile Memory Express (NVMe) namespace was created, changed,\nor deleted, an occasional deadlock occurred. With this update, namespace\nscanning and removal does not hold a mutual exclusion (mutex) program\nobject. As a result, a deadlock no longer occurs in the described scenario. \n(BZ#1566886)\n\n* Previously, a live migration of a virtual machine from one host with\nupdated firmware to another host without updated firmware resulted in\nincorrect kernel settings for Meltdown mitigations, which could leave the\nkernel vulnerable to Meltdown. With this fix, the firmware on the new\nphysical host is re-scanned for updates after a live migration. As a\nresult, the kernel uses the correct mitigation in the described scenario. \n(BZ#1570507)\n\n* Previously, microcode updates on 32 and 64-bit AMD and Intel\narchitectures were not synchronized. As a consequence, it was not possible\nto apply the microcode updates. This fix adds the synchronization to the\nmicrocode updates so that processors of the stated architectures receive\nupdates at the same time. As a result, microcode updates are now\nsynchronized. (BZ#1578044)\n\n* When switching from the indirect branch speculation (IBRS) feature to the\nretpolines feature, the IBRS state of some CPUs was sometimes not handled\ncorrectly. Consequently, some CPUs were left with the IBRS Model-Specific\nRegister (MSR) bit set to 1, which could lead to performance issues. With\nthis update, the underlying source code has been fixed to clear the IBRS\nMSR bits correctly, thus fixing the bug. (BZ#1586146)\n\nUsers of kernel are advised to upgrade to these updated packages, which fix\nthese bugs. \n\nThe system must be rebooted for this update to take effect. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1566890 - CVE-2018-3639 hw: cpu: speculative store bypass\n\n6. Package List:\n\nRed Hat Enterprise Linux ComputeNode EUS (v. 7.3):\n\nSource:\nkernel-3.10.0-514.53.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-514.53.1.el7.noarch.rpm\nkernel-doc-3.10.0-514.53.1.el7.noarch.rpm\n\nx86_64:\nkernel-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debug-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-devel-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-headers-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-514.53.1.el7.x86_64.rpm\nperf-3.10.0-514.53.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\npython-perf-3.10.0-514.53.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode Optional EUS (v. 7.3):\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-514.53.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server EUS (v. 7.3):\n\nSource:\nkernel-3.10.0-514.53.1.el7.src.rpm\n\nnoarch:\nkernel-abi-whitelists-3.10.0-514.53.1.el7.noarch.rpm\nkernel-doc-3.10.0-514.53.1.el7.noarch.rpm\n\nppc64:\nkernel-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-bootwrapper-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-debug-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-debug-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-debug-devel-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-devel-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-headers-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-tools-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-tools-libs-3.10.0-514.53.1.el7.ppc64.rpm\nperf-3.10.0-514.53.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\npython-perf-3.10.0-514.53.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\n\nppc64le:\nkernel-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-bootwrapper-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-debug-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-debug-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-devel-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-headers-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-tools-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-tools-libs-3.10.0-514.53.1.el7.ppc64le.rpm\nperf-3.10.0-514.53.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\npython-perf-3.10.0-514.53.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\n\ns390x:\nkernel-3.10.0-514.53.1.el7.s390x.rpm\nkernel-debug-3.10.0-514.53.1.el7.s390x.rpm\nkernel-debug-debuginfo-3.10.0-514.53.1.el7.s390x.rpm\nkernel-debug-devel-3.10.0-514.53.1.el7.s390x.rpm\nkernel-debuginfo-3.10.0-514.53.1.el7.s390x.rpm\nkernel-debuginfo-common-s390x-3.10.0-514.53.1.el7.s390x.rpm\nkernel-devel-3.10.0-514.53.1.el7.s390x.rpm\nkernel-headers-3.10.0-514.53.1.el7.s390x.rpm\nkernel-kdump-3.10.0-514.53.1.el7.s390x.rpm\nkernel-kdump-debuginfo-3.10.0-514.53.1.el7.s390x.rpm\nkernel-kdump-devel-3.10.0-514.53.1.el7.s390x.rpm\nperf-3.10.0-514.53.1.el7.s390x.rpm\nperf-debuginfo-3.10.0-514.53.1.el7.s390x.rpm\npython-perf-3.10.0-514.53.1.el7.s390x.rpm\npython-perf-debuginfo-3.10.0-514.53.1.el7.s390x.rpm\n\nx86_64:\nkernel-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debug-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debug-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debug-devel-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-devel-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-headers-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-libs-3.10.0-514.53.1.el7.x86_64.rpm\nperf-3.10.0-514.53.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\npython-perf-3.10.0-514.53.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional EUS (v. 7.3):\n\nppc64:\nkernel-debug-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-debuginfo-common-ppc64-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-tools-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\nkernel-tools-libs-devel-3.10.0-514.53.1.el7.ppc64.rpm\nperf-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\npython-perf-debuginfo-3.10.0-514.53.1.el7.ppc64.rpm\n\nppc64le:\nkernel-debug-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-debug-devel-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-debuginfo-common-ppc64le-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-tools-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\nkernel-tools-libs-devel-3.10.0-514.53.1.el7.ppc64le.rpm\nperf-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\npython-perf-debuginfo-3.10.0-514.53.1.el7.ppc64le.rpm\n\nx86_64:\nkernel-debug-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-debuginfo-common-x86_64-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\nkernel-tools-libs-devel-3.10.0-514.53.1.el7.x86_64.rpm\nperf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\npython-perf-debuginfo-3.10.0-514.53.1.el7.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2018-3639\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nYF80GD/Rvjo=ltf/\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. Relevant releases/architectures:\n\nRHV-M 4.3 - noarch\n\n3. \nIt includes the configuration of the Red Hat Support plugin, copying\ndownstream-only artifacts to the ISO domain, and links to the knowledgebase\nand other support material. There are three primary variants of the\nissue which differ in the way the speculative execution can be exploited. \nVariant CVE-2017-5754 relies on the fact that, on impacted microprocessors,\nduring speculative execution of instruction permission faults, exception\ngeneration triggered by a faulting access is suppressed until the\nretirement of the whole instruction block. Note: CVE-2017-5754 affects Intel\nx86-64 microprocessors. AMD x86-64 microprocessors are not affected by this\nissue. (CVE-2017-5754)\n\nBug Fix(es):\n\n* [CVE-2017-5754] Variant3: POWER {qemu-kvm-rhev} Add machine type variants\n(BZ#1559948)\n\n* add POWER 9 to the 4.2 cluster level (BZ#1574494)\n\n4. 6.6) - x86_64\n\n3. Description:\n\nThe libvirt library contains a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems. In\naddition, libvirt provides tools for remote management of virtualized\nsystems", "sources": [ { "db": "NVD", "id": "CVE-2018-3639" }, { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-13391" }, { "db": "VULHUB", "id": "VHN-133670" }, { "db": "VULHUB", "id": "VHN-133671" }, { "db": "PACKETSTORM", "id": "147778" }, { "db": "PACKETSTORM", "id": "150070" }, { "db": "PACKETSTORM", "id": "148244" }, { "db": "PACKETSTORM", "id": "151288" }, { "db": "PACKETSTORM", "id": "147738" }, { "db": "PACKETSTORM", "id": "147758" }, { "db": "PACKETSTORM", "id": "148330" }, { "db": "PACKETSTORM", "id": "148484" }, { "db": "PACKETSTORM", "id": "152767" }, { "db": "PACKETSTORM", "id": "150077" }, { "db": "PACKETSTORM", "id": "147748" }, { "db": "PACKETSTORM", "id": "150075" } ], "trust": 3.42 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-133670", "trust": 0.1, "type": "unknown" } ], "sources": [ { "db": "VULHUB", "id": "VHN-133670" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-3639", "trust": 3.6 }, { "db": "USCERT", "id": "TA18-141A", "trust": 2.6 }, { "db": "CERT/CC", "id": "VU#180049", "trust": 2.6 }, { "db": "SECTRACK", "id": "1040949", "trust": 2.4 }, { "db": "BID", "id": "104232", "trust": 2.3 }, { "db": "LENOVO", "id": "LEN-22133", "trust": 1.8 }, { "db": "SIEMENS", "id": "SSA-268644", "trust": 1.8 }, { "db": "SIEMENS", "id": "SSA-608355", "trust": 1.8 }, { "db": "SECTRACK", "id": "1042004", "trust": 1.8 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2020/06/10/5", "trust": 1.7 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2020/06/10/1", "trust": 1.7 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2020/06/10/2", "trust": 1.7 }, { "db": "EXPLOIT-DB", "id": "44695", "trust": 1.7 }, { "db": "SIEMENS", "id": "SSA-505225", "trust": 1.7 }, { "db": "CERT/CC", "id": "VU#584653", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "152767", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2018-13391", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.2340", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3058", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.2798", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3052", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.0077.2", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.1025.2", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4343", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.0854", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.4156", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.0726", "trust": 0.6 }, { "db": "LENOVO", "id": "LEN-30550", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201805-749", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "148484", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "147748", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "148330", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "150077", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "147738", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "147778", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "147758", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "150075", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "151288", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "148581", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148151", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147743", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148318", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148731", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148817", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150097", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147932", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150076", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147839", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147749", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148324", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147769", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147746", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147765", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147762", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147770", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147754", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147756", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147931", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148323", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147751", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147747", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147764", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147755", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147873", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150073", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148699", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147763", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148656", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147744", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147779", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147734", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147750", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148370", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147767", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147719", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150090", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147737", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147742", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147796", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147720", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "149127", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "149390", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148614", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148818", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147752", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150096", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147745", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147753", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148751", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147780", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148842", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147733", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147866", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147740", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147757", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147741", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150079", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150078", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148853", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147735", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147766", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148695", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147938", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147933", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147721", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147760", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148975", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150095", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150074", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147736", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147761", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148317", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147904", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147759", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147930", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148507", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147739", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147851", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "147934", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-133670", "trust": 0.1 }, { "db": "BID", "id": "104228", "trust": 0.1 }, { "db": "CNNVD", "id": "CNNVD-201805-748", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-133671", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "150070", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148244", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-13391" }, { "db": "VULHUB", "id": "VHN-133670" }, { "db": "VULHUB", "id": "VHN-133671" }, { "db": "PACKETSTORM", "id": "147778" }, { "db": "PACKETSTORM", "id": "150070" }, { "db": "PACKETSTORM", "id": "148244" }, { "db": "PACKETSTORM", "id": "151288" }, { "db": "PACKETSTORM", "id": "150075" }, { "db": "PACKETSTORM", "id": "147738" }, { "db": "PACKETSTORM", "id": "147758" }, { "db": "PACKETSTORM", "id": "148330" }, { "db": "PACKETSTORM", "id": "148484" }, { "db": "PACKETSTORM", "id": "152767" }, { "db": "PACKETSTORM", "id": "150077" }, { "db": "PACKETSTORM", "id": "147748" }, { "db": "CNNVD", "id": "CNNVD-201805-749" }, { "db": "NVD", "id": "CVE-2018-3639" } ] }, "id": "VAR-201805-0963", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2018-13391" }, { "db": "VULHUB", "id": "VHN-133670" }, { "db": "VULHUB", "id": "VHN-133671" } ], "trust": 1.4987851138095238 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-13391" } ] }, "last_update_date": "2024-11-29T22:19:19.544000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patches for multiple CPUHardware information disclosure vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/134555" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-13391" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-203", "trust": 1.2 }, { "problemtype": "CWE-200", "trust": 0.2 } ], "sources": [ { "db": "VULHUB", "id": "VHN-133670" }, { "db": "VULHUB", "id": "VHN-133671" }, { "db": "NVD", "id": "CVE-2018-3639" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" }, { "trust": 2.6, "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "trust": 2.6, "url": "https://www.us-cert.gov/ncas/alerts/ta18-141a" }, { "trust": 2.6, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180521-cpusidechannel" }, { "trust": 2.5, "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "trust": 2.3, "url": "http://www.securityfocus.com/bid/104232" }, { "trust": 2.3, "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "trust": 2.3, "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html" }, { "trust": 2.3, "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "trust": 1.8, "url": "https://www.kb.cert.org/vuls/id/180049" }, { "trust": 1.8, "url": "http://support.lenovo.com/us/en/solutions/len-22133" }, { "trust": 1.8, "url": "http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html" }, { "trust": 1.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf" }, { "trust": 1.8, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "trust": 1.8, "url": "https://security.netapp.com/advisory/ntap-20180521-0001/" }, { "trust": 1.8, "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006" }, { "trust": 1.8, "url": "https://www.synology.com/support/security/synology_sa_18_23" }, { "trust": 1.8, "url": "https://www.debian.org/security/2018/dsa-4273" }, { "trust": 1.8, "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html" }, { "trust": 1.8, "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2018:1649" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2018:1653" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2018:1655" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2018:1689" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2018:1854" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2018:2060" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2018:2161" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2018:2948" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2018:3398" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2018:3400" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2019:0148" }, { "trust": 1.8, "url": "https://access.redhat.com/errata/rhsa-2019:1046" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1040949" }, { "trust": 1.8, "url": "http://www.securitytracker.com/id/1042004" }, { "trust": 1.8, "url": "https://usn.ubuntu.com/3756-1/" }, { "trust": 1.7, "url": "https://access.redhat.com/security/vulnerabilities/ssbd" }, { "trust": 1.7, "url": "https://seclists.org/bugtraq/2019/jun/36" }, { "trust": 1.7, "url": "http://xenbits.xen.org/xsa/advisory-263.html" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "trust": 1.7, "url": "https://help.ecostruxureit.com/display/public/uadce725/security+fixes+in+struxureware+data+center+expert+v7.6.0" }, { "trust": 1.7, "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787" }, { "trust": 1.7, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180012" }, { "trust": 1.7, "url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2018-0004" }, { "trust": 1.7, "url": "https://support.citrix.com/article/ctx235225" }, { "trust": 1.7, "url": "https://support.oracle.com/knowledge/sun%20microsystems/2481872_1.html" }, { "trust": 1.7, "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "trust": 1.7, "url": "https://www.debian.org/security/2018/dsa-4210" }, { "trust": 1.7, "url": "https://www.exploit-db.com/exploits/44695/" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "trust": 1.7, "url": "http://www.openwall.com/lists/oss-security/2020/06/10/2" }, { "trust": 1.7, "url": "http://www.openwall.com/lists/oss-security/2020/06/10/5" }, { "trust": 1.7, "url": "http://www.openwall.com/lists/oss-security/2020/06/10/1" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1629" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1630" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1632" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1633" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1635" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1636" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1637" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1638" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1639" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1640" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1641" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1642" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1643" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1644" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1645" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1646" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1647" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1648" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1650" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1651" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1652" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1654" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1656" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1657" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1658" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1659" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1660" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1661" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1662" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1663" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1664" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1665" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1666" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1667" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1668" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1669" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1674" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1675" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1676" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1686" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1688" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1690" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1696" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1710" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1711" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1737" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1738" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1826" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1965" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1967" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:1997" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2001" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2003" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2006" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2162" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2164" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2171" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2172" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2216" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2228" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2246" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2250" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2258" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2289" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2309" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2328" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2363" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2364" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2387" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2394" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:2396" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:3396" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:3397" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:3399" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:3401" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:3402" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:3407" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:3423" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:3424" }, { "trust": 1.7, "url": "https://access.redhat.com/errata/rhsa-2018:3425" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" }, { "trust": 1.7, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" }, { "trust": 1.7, "url": "https://usn.ubuntu.com/3651-1/" }, { "trust": 1.7, "url": "https://usn.ubuntu.com/3652-1/" }, { "trust": 1.7, "url": "https://usn.ubuntu.com/3653-1/" }, { "trust": 1.7, "url": "https://usn.ubuntu.com/3653-2/" }, { "trust": 1.7, "url": "https://usn.ubuntu.com/3654-1/" }, { "trust": 1.7, "url": "https://usn.ubuntu.com/3654-2/" }, { "trust": 1.7, "url": "https://usn.ubuntu.com/3655-1/" }, { "trust": 1.7, "url": "https://usn.ubuntu.com/3655-2/" }, { "trust": 1.7, "url": "https://usn.ubuntu.com/3679-1/" }, { "trust": 1.7, "url": "https://usn.ubuntu.com/3680-1/" }, { "trust": 1.7, "url": "https://usn.ubuntu.com/3777-3/" }, { "trust": 1.6, "url": "https://support.apple.com//ht208394" }, { "trust": 1.6, "url": "http://www.dell.com/support/speculative-store-bypass" }, { "trust": 1.6, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03850en_us" }, { "trust": 1.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 1.2, "url": "https://access.redhat.com/security/cve/cve-2018-3639" }, { "trust": 1.2, "url": "https://bugzilla.redhat.com/):" }, { "trust": 1.2, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 1.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 1.2, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 1.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 1.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3639" }, { "trust": 0.8, "url": "https://vuls.cert.org/confluence/display/wiki/vulnerabilities+associated+with+cpu+speculative+execution" }, { "trust": 0.8, "url": "https://developer.amd.com/wp-content/resources/124441_amd64_speculativestorebypassdisable_whitepaper_final.pdf" }, { "trust": 0.8, "url": "https://www.kb.cert.org/vuls/id/584653" }, { "trust": 0.8, "url": "http://cwe.mitre.org/data/definitions/208.html" }, { "trust": 0.8, "url": "https://software.intel.com/sites/default/files/managed/c5/63/336996-speculative-execution-side-channel-mitigations.pdf" }, { "trust": 0.8, "url": "https://software.intel.com/sites/default/files/managed/b9/f9/336983-intel-analysis-of-speculative-execution-side-channels-white-paper.pdf" }, { "trust": 0.8, "url": "https://fortiguard.com/psirt/fg-ir-18-002" }, { "trust": 0.8, "url": "https://support.hp.com/us-en/document/c06001626" }, { "trust": 0.8, "url": "http://www.hitachi.com/hirt/publications/hirt-pub18001/" }, { "trust": 0.8, "url": "https://www.ibm.com/blogs/psirt/potential-impact-processors-power-family/" }, { "trust": 0.8, "url": "https://docs.microsoft.com/en-us/cpp/security/developer-guidance-speculative-execution" }, { "trust": 0.8, "url": "https://www.suse.com/support/kb/doc/?id=7022937" }, { "trust": 0.8, "url": "https://www.synology.com/en-global/support/security/synology_sa_18_23" }, { "trust": 0.8, "url": "https://wiki.ubuntu.com/securityteam/knowledgebase/variant4" }, { "trust": 0.8, "url": "https://kb.vmware.com/s/article/54951" }, { "trust": 0.8, "url": "https://aws.amazon.com/security/security-bulletins/aws-2018-015/" }, { "trust": 0.6, "url": "https://securitytracker.com/id/1040949" }, { "trust": 0.6, "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190049-1/" }, { "trust": 0.6, "url": "http://www.ibm.com/support/docview.wss" }, { "trust": 0.6, "url": "https://security.business.xerox.com/wp-content/uploads/2019/11/cert_xrx19-029_ffpsv2_win10_securitybulletin_nov2019.pdf" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/77958" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/73854" }, { "trust": 0.6, "url": "https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20180615-01-cpu-cn" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2340/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/76682" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/152767/red-hat-security-advisory-2019-1046-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4343/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.2798/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3052/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.4156" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3058" }, { "trust": 0.6, "url": "http://www.ibm.com/support/docview.wss?uid=ibm10872470" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/77246" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/en/product_security/len-30550" }, { "trust": 0.6, "url": "http://www.ibm.com/support/docview.wss?uid=ibm10879093" }, { "trust": 0.2, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026amp;docid=emr_na-hpesbhf03850en_us" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2018-5803" }, { "trust": 0.1, "url": "http://www.securityfocus.com/bid/104228" }, { "trust": 0.1, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv180013" }, { "trust": 0.1, "url": "https://psirt.global.sonicwall.com/vuln-detail/snwlid-2018-0005" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-7566" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1120" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1000200" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-16648" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10880" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-10882" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10883" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1065" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10881" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10322" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-14619" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/7/html/7.6_release_notes/index" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10877" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-10878" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-13405" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-10880" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10882" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18208" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-12232" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-17805" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1000026" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1000200" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-17805" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-10877" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-10879" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-10883" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1000204" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-10322" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16648" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10879" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1092" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-11506" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-5750" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/3658021" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18075" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-10881" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1095" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-13166" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1118" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-17806" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-5390" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-13166" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1000026" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-8781" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-18208" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-9363" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-14641" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1065" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1068" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-5344" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1094" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18344" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-10940" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1068" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1092" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/3553061" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-18344" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1094" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-7757" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10940" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-5848" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1118" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-5391" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10878" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1095" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1000204" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-18075" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-17806" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1120" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/6.10_technical_notes/index.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-5803" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-2671" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-6701" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-7308" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7889" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-2671" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-8890" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-7889" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-1130" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-15121" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2015-8830" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/6.10_release_notes/index.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-12190" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-9077" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-18203" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6001" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2012-6701" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-9076" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-9076" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-8830" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-9075" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-7616" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-9075" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-6001" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-9077" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-15121" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2018-1130" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2017-8890" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-8650" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7616" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-18203" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2016-8650" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-12190" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-7308" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/2974891" } ], "sources": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-13391" }, { "db": "VULHUB", "id": "VHN-133670" }, { "db": "VULHUB", "id": "VHN-133671" }, { "db": "PACKETSTORM", "id": "147778" }, { "db": "PACKETSTORM", "id": "150070" }, { "db": "PACKETSTORM", "id": "148244" }, { "db": "PACKETSTORM", "id": "151288" }, { "db": "PACKETSTORM", "id": "150075" }, { "db": "PACKETSTORM", "id": "147738" }, { "db": "PACKETSTORM", "id": "147758" }, { "db": "PACKETSTORM", "id": "148330" }, { "db": "PACKETSTORM", "id": "148484" }, { "db": "PACKETSTORM", "id": "152767" }, { "db": "PACKETSTORM", "id": "150077" }, { "db": "PACKETSTORM", "id": "147748" }, { "db": "CNNVD", "id": "CNNVD-201805-749" }, { "db": "NVD", "id": "CVE-2018-3639" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#180049" }, { "db": "CNVD", "id": "CNVD-2018-13391" }, { "db": "VULHUB", "id": "VHN-133670" }, { "db": "VULHUB", "id": "VHN-133671" }, { "db": "PACKETSTORM", "id": "147778" }, { "db": "PACKETSTORM", "id": "150070" }, { "db": "PACKETSTORM", "id": "148244" }, { "db": "PACKETSTORM", "id": "151288" }, { "db": "PACKETSTORM", "id": "150075" }, { "db": "PACKETSTORM", "id": "147738" }, { "db": "PACKETSTORM", "id": "147758" }, { "db": "PACKETSTORM", "id": "148330" }, { "db": "PACKETSTORM", "id": "148484" }, { "db": "PACKETSTORM", "id": "152767" }, { "db": "PACKETSTORM", "id": "150077" }, { "db": "PACKETSTORM", "id": "147748" }, { "db": "CNNVD", "id": "CNNVD-201805-749" }, { "db": "NVD", "id": "CVE-2018-3639" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-05-21T00:00:00", "db": "CERT/CC", "id": "VU#180049" }, { "date": "2018-07-18T00:00:00", "db": "CNVD", "id": "CNVD-2018-13391" }, { "date": "2018-05-22T00:00:00", "db": "VULHUB", "id": "VHN-133670" }, { "date": "2018-05-22T00:00:00", "db": "VULHUB", "id": "VHN-133671" }, { "date": "2018-05-23T07:09:25", "db": "PACKETSTORM", "id": "147778" }, { "date": "2018-10-31T01:11:59", "db": "PACKETSTORM", "id": "150070" }, { "date": "2018-06-19T22:22:22", "db": "PACKETSTORM", "id": "148244" }, { "date": "2019-01-23T21:29:07", "db": "PACKETSTORM", "id": "151288" }, { "date": "2018-10-31T01:13:27", "db": "PACKETSTORM", "id": "150075" }, { "date": "2018-05-23T06:55:26", "db": "PACKETSTORM", "id": "147738" }, { "date": "2018-05-23T07:01:56", "db": "PACKETSTORM", "id": "147758" }, { "date": "2018-06-27T13:56:46", "db": "PACKETSTORM", "id": "148330" }, { "date": "2018-07-11T02:45:29", "db": "PACKETSTORM", "id": "148484" }, { "date": "2019-05-08T17:46:11", "db": "PACKETSTORM", "id": "152767" }, { "date": "2018-10-31T01:13:43", "db": "PACKETSTORM", "id": "150077" }, { "date": "2018-05-23T06:59:09", "db": "PACKETSTORM", "id": "147748" }, { "date": "2018-05-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201805-749" }, { "date": "2018-05-22T12:29:00.250000", "db": "NVD", "id": "CVE-2018-3639" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-06-19T00:00:00", "db": "CERT/CC", "id": "VU#180049" }, { "date": "2018-07-18T00:00:00", "db": "CNVD", "id": "CNVD-2018-13391" }, { "date": "2020-09-02T00:00:00", "db": "VULHUB", "id": "VHN-133670" }, { "date": "2020-08-24T00:00:00", "db": "VULHUB", "id": "VHN-133671" }, { "date": "2021-12-08T00:00:00", "db": "CNNVD", "id": "CNNVD-201805-749" }, { "date": "2024-11-21T04:05:48.867000", "db": "NVD", "id": "CVE-2018-3639" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-201805-749" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "CPU hardware utilizing speculative execution may be vulnerable to cache side-channel attacks", "sources": [ { "db": "CERT/CC", "id": "VU#180049" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "bypass", "sources": [ { "db": "PACKETSTORM", "id": "147778" }, { "db": "PACKETSTORM", "id": "151288" }, { "db": "PACKETSTORM", "id": "150075" }, { "db": "PACKETSTORM", "id": "147738" }, { "db": "PACKETSTORM", "id": "147758" }, { "db": "PACKETSTORM", "id": "148330" }, { "db": "PACKETSTORM", "id": "148484" }, { "db": "PACKETSTORM", "id": "150077" }, { "db": "PACKETSTORM", "id": "147748" } ], "trust": 0.9 } }
var-201711-0650
Vulnerability from variot
Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege. Intel Manageability Engine The Intel Management Engine is Intel's thermal management driver for its desktop family of chipsets. Failed exploit attempts will likely result in denial-of-service conditions. Intel Manageability Engine versions 8.x, 9.x, 10.x, 11.0,11.5,11.6,11.7,11.10, and 11.20 are vulnerable. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. Active Management Technology (AMT) is one of the active management components. The following products and versions are affected: Intel Manageability Engine Firmware Versions 8.x, 9.x, 10.x, 11.0, 11.5, 11.6, 11.7, 11.10, 11.20; 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201711-0650", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "manageability engine", "scope": "eq", "trust": 2.5, "vendor": "intel", "version": "11.7" }, { "model": "manageability engine", "scope": "eq", "trust": 2.5, "vendor": "intel", "version": "11.6" }, { "model": "manageability engine", "scope": "eq", "trust": 2.5, "vendor": "intel", "version": "11.5" }, { "model": "manageability engine", "scope": "eq", "trust": 2.5, "vendor": "intel", "version": "11.20" }, { "model": "manageability engine", "scope": "eq", "trust": 2.5, "vendor": "intel", "version": "11.10" }, { "model": "manageability engine", "scope": "eq", "trust": 2.5, "vendor": "intel", "version": "11.0" }, { "model": "active management technology", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": null }, { "model": "simatic ipc827c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.2.61.3535" }, { "model": "rog maximus ix extreme", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "sinumerik pcu50.5-p", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.2.61.3535" }, { "model": "b150m-c", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z270h gaming\\/k1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "q170t v2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simotion p320-4s", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "17.02.06.83.1" }, { "model": "rog strix z270i gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b250 mining expert", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime j3355i-c", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "ex-b150m-v3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "q170m2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z370-i gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170m-e d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime b250m-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "sabertooth z170 mark 1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150 pro gaming\\/aura", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h170-plus d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z370-h gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "q170t", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-c2\\/tf", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus x code", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "manageability engine", "scope": "lte", "trust": 1.0, "vendor": "intel", "version": "9.1.41.3024" }, { "model": "manageability engine", "scope": "lte", "trust": 1.0, "vendor": "intel", "version": "10.0.55.3000" }, { "model": "h110m-c2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z370-e gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc547d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1.91.3272" }, { "model": "prime z270-p", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z270h gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "tuf z370-plus gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h170 pro gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc627c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.2.61.3535" }, { "model": "prime z270-k", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc677d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "9.1.41.3024" }, { "model": "b150m-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc847c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.2.61.3535" }, { "model": "h110i-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-ks", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170i pro gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-e\\/m.2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime h110m-p", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h170m-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-c", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc827d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "9.1.41.3024" }, { "model": "z170m-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b250-mr", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "pio-b250i", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-c\\/hdmi", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b250m-f plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime b250m-d", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170-p", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus ix formula", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc477d", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "simatic field pg m5", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "22.01.04" }, { "model": "rog strix b250f gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h170m-plus\\/br", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170 pro gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-a\\/dp", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150-pro d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime h110m2\\/fpt", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc647d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "9.1.41.3024" }, { "model": "z170-ar", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h170-pro\\/usb 3.1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-k x", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic itp1000", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "23.01.03" }, { "model": "rog maximus ix hero", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h170i-pro", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-cs", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z270f gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "manageability engine", "scope": "gte", "trust": 1.0, "vendor": "intel", "version": "9.0.0.0" }, { "model": "ex-h110m-v", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus x formula", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "manageability engine", "scope": "gte", "trust": 1.0, "vendor": "intel", "version": "8.0.0.0" }, { "model": "manageability engine", "scope": "lte", "trust": 1.0, "vendor": "intel", "version": "8.1.71.3608" }, { "model": "b150-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-a d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170-k", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime h270-pro", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc477d pro", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "h170-pro", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-ts", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m pro gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime b250-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-v plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "q170m-cm-b", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z370-g gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "ex-b250-v7", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-k d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-ks r1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus viii gene", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110s2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "ex-b250m-v", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime b250m-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus viii formula", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-c\\/br", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "q170s1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "tuf z370-pro gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime z270-ar", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-d", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc627d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "9.1.41.3024" }, { "model": "ex-h110m-v3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime z270m-plus\\/br", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170-deluxe", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "q170m-c", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "ex-b250m-v3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "tuf z270 mark 2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170-p d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix b250g gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix h270f gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-k d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus ix apex", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc647c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.2.61.3535" }, { "model": "b150m-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-e", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-r", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime z270-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc847d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "9.1.41.3024" }, { "model": "rog maximus viii ranger", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-f", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-f plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-a\\/m.2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix b250h gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z370-f gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "pio-b150m", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150 pro gaming d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "tuf z270 mark 1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus viii hero alpha", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic field pg m4", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "18.01.06" }, { "model": "z170-pro", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z270e gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus viii extreme", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150i pro gaming\\/aura", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus viii hero", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150i pro gaming\\/wifi\\/aura", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-a d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "q170m2\\/cdm\\/si", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170m-plus\\/br", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "trooper h110 d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime b250-pro", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170 pro gaming\\/aura", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime q270m-c", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime z370-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-plus d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "trooper b150 d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime h270-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc427e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.07" }, { "model": "h110m-d\\/exper\\/si", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime z270m-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime h110m2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150 pro gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-a\\/m.2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110t-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170-premium", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110s1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-cs x", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime b250m-plus\\/br", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "ex-b150m-v5", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime z370-p", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime b250-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150-pro", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "sabertooth z170 s", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-c\\/br", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-c\\/ps", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-k", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-cs\\/br", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus x hero", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus ix code", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170-e", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic field pg m3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.2.61.3535" }, { "model": "prime b250m-k", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus x apex", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "q270m-cm-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc677c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.2.61.3535" }, { "model": "h170m-e d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b250-s", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc427d", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "ex-b250m-v5", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "sinumerik pcu50.5-c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.2.61.3535" }, { "model": "h110m-p\\/dvi", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix b250i gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-c d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110t", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b250m-c pro", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-k", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime h270m-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc547e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "9.1.41.3024" }, { "model": "rog strix h270i gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-d", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "manageability engine", "scope": "gte", "trust": 1.0, "vendor": "intel", "version": "10.0.0.0" }, { "model": "rog maximus viii impact", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc477e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.07" }, { "model": "ex-b150-v7", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "ex-b150m-v", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime b250m-c", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "q270-s", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z270g gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime b250m-j", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "manageability engine", "scope": "eq", "trust": 0.9, "vendor": "intel", "version": "9.0" }, { "model": "manageability engine", "scope": "eq", "trust": 0.9, "vendor": "intel", "version": "8.0" }, { "model": "manageability engine", "scope": "eq", "trust": 0.9, "vendor": "intel", "version": "10.0" }, { "model": "active management technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "manageability engine", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "manageability engine", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "manageability engine", "version": "11.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "manageability engine", "version": "11.5" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "manageability engine", "version": "11.6" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "manageability engine", "version": "11.7" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "manageability engine", "version": "11.10" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "manageability engine", "version": "11.20" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "active management", "version": null } ], "sources": [ { "db": "IVD", "id": "e2e04451-39ab-11e9-b6f1-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2017-37851" }, { "db": "BID", "id": "101918" }, { "db": "JVNDB", "id": "JVNDB-2017-010467" }, { "db": "CNNVD", "id": "CNNVD-201711-881" }, { "db": "NVD", "id": "CVE-2017-5711" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:intel:active_management_technology_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:manageability_engine_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-010467" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "101918" } ], "trust": 0.3 }, "cve": "CVE-2017-5711", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CVE-2017-5711", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "CNVD-2017-37851", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "e2e04451-39ab-11e9-b6f1-000c29342cb1", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.9, "id": "VHN-113914", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2017-5711", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2017-5711", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-5711", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-5711", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2017-37851", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201711-881", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "e2e04451-39ab-11e9-b6f1-000c29342cb1", "trust": 0.2, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-113914", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "e2e04451-39ab-11e9-b6f1-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2017-37851" }, { "db": "VULHUB", "id": "VHN-113914" }, { "db": "JVNDB", "id": "JVNDB-2017-010467" }, { "db": "CNNVD", "id": "CNNVD-201711-881" }, { "db": "NVD", "id": "CVE-2017-5711" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege. Intel Manageability Engine The Intel Management Engine is Intel\u0027s thermal management driver for its desktop family of chipsets. Failed exploit attempts will likely result in denial-of-service conditions. \nIntel Manageability Engine versions 8.x, 9.x, 10.x, 11.0,11.5,11.6,11.7,11.10, and 11.20 are vulnerable. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. Active Management Technology (AMT) is one of the active management components. The following products and versions are affected: Intel Manageability Engine Firmware Versions 8.x, 9.x, 10.x, 11.0, 11.5, 11.6, 11.7, 11.10, 11.20; 6th, 7th, and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors", "sources": [ { "db": "NVD", "id": "CVE-2017-5711" }, { "db": "JVNDB", "id": "JVNDB-2017-010467" }, { "db": "CNVD", "id": "CNVD-2017-37851" }, { "db": "BID", "id": "101918" }, { "db": "IVD", "id": "e2e04451-39ab-11e9-b6f1-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-113914" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-5711", "trust": 3.6 }, { "db": "BID", "id": "101918", "trust": 2.6 }, { "db": "SECTRACK", "id": "1039852", "trust": 1.7 }, { "db": "SIEMENS", "id": "SSA-892715", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-201711-881", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2017-37851", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-010467", "trust": 0.8 }, { "db": "IVD", "id": "E2E04451-39AB-11E9-B6F1-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-113914", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "e2e04451-39ab-11e9-b6f1-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2017-37851" }, { "db": "VULHUB", "id": "VHN-113914" }, { "db": "BID", "id": "101918" }, { "db": "JVNDB", "id": "JVNDB-2017-010467" }, { "db": "CNNVD", "id": "CNNVD-201711-881" }, { "db": "NVD", "id": "CVE-2017-5711" } ] }, "id": "VAR-201711-0650", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "e2e04451-39ab-11e9-b6f1-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2017-37851" }, { "db": "VULHUB", "id": "VHN-113914" } ], "trust": 1.48846155 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "e2e04451-39ab-11e9-b6f1-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2017-37851" } ] }, "last_update_date": "2024-11-23T21:53:37.809000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "INTEL-SA-00086", "trust": 0.8, "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "title": "NTAP-20171120-0001", "trust": 0.8, "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "title": "Intel Manageability Engine has multiple patches for local buffer overflow vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/111455" }, { "title": "Multiple Intel product Manageability Engine Firmware Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=76613" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-37851" }, { "db": "JVNDB", "id": "JVNDB-2017-010467" }, { "db": "CNNVD", "id": "CNNVD-201711-881" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-113914" }, { "db": "JVNDB", "id": "JVNDB-2017-010467" }, { "db": "NVD", "id": "CVE-2017-5711" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00086\u0026languageid=en-fr" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/101918" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "trust": 1.7, "url": "https://www.asus.com/news/wzeltg5cjyaiwgj0" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1039852" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5711" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5711" }, { "trust": 0.3, "url": "http://www.intel.com/content/www/us/en/homepage.html" }, { "trust": 0.1, "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00086\u0026amp;languageid=en-fr" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-37851" }, { "db": "VULHUB", "id": "VHN-113914" }, { "db": "BID", "id": "101918" }, { "db": "JVNDB", "id": "JVNDB-2017-010467" }, { "db": "CNNVD", "id": "CNNVD-201711-881" }, { "db": "NVD", "id": "CVE-2017-5711" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "e2e04451-39ab-11e9-b6f1-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2017-37851" }, { "db": "VULHUB", "id": "VHN-113914" }, { "db": "BID", "id": "101918" }, { "db": "JVNDB", "id": "JVNDB-2017-010467" }, { "db": "CNNVD", "id": "CNNVD-201711-881" }, { "db": "NVD", "id": "CVE-2017-5711" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-12-22T00:00:00", "db": "IVD", "id": "e2e04451-39ab-11e9-b6f1-000c29342cb1" }, { "date": "2017-12-22T00:00:00", "db": "CNVD", "id": "CNVD-2017-37851" }, { "date": "2017-11-21T00:00:00", "db": "VULHUB", "id": "VHN-113914" }, { "date": "2017-11-20T00:00:00", "db": "BID", "id": "101918" }, { "date": "2017-12-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-010467" }, { "date": "2017-11-22T00:00:00", "db": "CNNVD", "id": "CNNVD-201711-881" }, { "date": "2017-11-21T14:29:00.510000", "db": "NVD", "id": "CVE-2017-5711" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-12-22T00:00:00", "db": "CNVD", "id": "CNVD-2017-37851" }, { "date": "2018-05-11T00:00:00", "db": "VULHUB", "id": "VHN-113914" }, { "date": "2017-12-19T22:00:00", "db": "BID", "id": "101918" }, { "date": "2017-12-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-010467" }, { "date": "2023-05-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201711-881" }, { "date": "2024-11-21T03:28:16.290000", "db": "NVD", "id": "CVE-2017-5711" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "101918" }, { "db": "CNNVD", "id": "CNNVD-201711-881" } ], "trust": 0.9 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Manageability Engine Firmware of Active Management Technology Buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-010467" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201711-881" } ], "trust": 0.6 } }
var-201809-1104
Vulnerability from variot
Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network. Intel Active Management Technology Contains a cryptographic vulnerability.Information may be obtained. Multiple Siemens Products are prone to the following security vulnerabilities: 1. Multiple stack-based buffer-overflow vulnerabilities 2. A denial-of-service vulnerability 3. A side channel attack information disclosure vulnerability Attackers can exploit these issues to execute arbitrary code within the context of an affected device or obtain sensitive information or cause a denial-of-service condition. The following Siemens products are affected: SIMATIC FieldPG M5 All versions prior to 22.01.06, SIMATIC IPC427E All versions prior to 21.01.09, SIMATIC IPC477E All versions prior to 21.01.09, SIMATIC IPC547E All versions prior to R1.30.0, SIMATIC IPC547G All versions prior to R1.23.0, SIMATIC IPC627D All versions prior to 19.02.11, SIMATIC IPC647D All versions prior to 19.01.14, SIMATIC IPC677D All versions prior to 19.02.11, SIMATIC IPC827D All versions prior to 19.02.11, SIMATIC IPC847D All versions prior to 19.01.14, and SIMATIC ITP1000 All versions prior to 23.01.04. A security vulnerability exists in the TLS implementation in versions prior to Intel AMT 12.0.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201809-1104", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "active management technology", "scope": "lt", "trust": 1.8, "vendor": "intel", "version": "12.0.5" }, { "model": "simatic itp1000", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "23.01.04" }, { "model": "simatic ipc477e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.09" }, { "model": "manageability engine", "scope": "gte", "trust": 1.0, "vendor": "intel", "version": "9.0.0.0" }, { "model": "simatic ipc827d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.02.11" }, { "model": "simatic field pg m5", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "22.01.06" }, { "model": "simatic pc547g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "r1.23.0" }, { "model": "simatic ipc627d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.02.11" }, { "model": "simatic ipc677d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.02.11" }, { "model": "simatic ipc427e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.09" }, { "model": "converged security management engine", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "12.0.5" }, { "model": "manageability engine", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "11.0" }, { "model": "simatic ipc547e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "r1.30.0" }, { "model": "simatic ipc647d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.01.14" }, { "model": "converged security management engine", "scope": "gte", "trust": 1.0, "vendor": "intel", "version": "11.0.0" }, { "model": "simatic ipc847d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "19.01.14" }, { "model": "active management technology", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "11.2" }, { "model": "simatic itp1000", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc847d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc827d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc677d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc647d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc627d", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc547g", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc547e", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc477e", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc427e", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic fieldpg m5", "scope": "eq", "trust": 0.3, "vendor": "siemens", "version": "0" }, { "model": "simatic ipc847d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.01.14" }, { "model": "simatic ipc827d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.02.11" }, { "model": "simatic ipc677d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.01.11" }, { "model": "simatic ipc647d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.01.14" }, { "model": "simatic ipc627d", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v19.02.11" }, { "model": "simatic ipc547g r1.23.0", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": null }, { "model": "simatic ipc547e r1.30.0", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": null }, { "model": "simatic ipc477e", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v21.01.09" }, { "model": "simatic ipc427e", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v21.01.09" }, { "model": "simatic fieldpg m5", "scope": "ne", "trust": 0.3, "vendor": "siemens", "version": "v22.01.06" } ], "sources": [ { "db": "BID", "id": "106996" }, { "db": "JVNDB", "id": "JVNDB-2018-010878" }, { "db": "CNNVD", "id": "CNNVD-201809-608" }, { "db": "NVD", "id": "CVE-2018-3616" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:intel:active_management_technology", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010878" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.,Siemens reported these vulnerabilities to NCCIC.", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-608" } ], "trust": 0.6 }, "cve": "CVE-2018-3616", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2018-3616", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "VHN-133647", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2018-3616", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2018-3616", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-3616", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2018-3616", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201809-608", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-133647", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-133647" }, { "db": "JVNDB", "id": "JVNDB-2018-010878" }, { "db": "CNNVD", "id": "CNNVD-201809-608" }, { "db": "NVD", "id": "CVE-2018-3616" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network. Intel Active Management Technology Contains a cryptographic vulnerability.Information may be obtained. Multiple Siemens Products are prone to the following security vulnerabilities:\n1. Multiple stack-based buffer-overflow vulnerabilities\n2. A denial-of-service vulnerability\n3. A side channel attack information disclosure vulnerability\nAttackers can exploit these issues to execute arbitrary code within the context of an affected device or obtain sensitive information or cause a denial-of-service condition. \nThe following Siemens products are affected:\nSIMATIC FieldPG M5 All versions prior to 22.01.06,\nSIMATIC IPC427E All versions prior to 21.01.09,\nSIMATIC IPC477E All versions prior to 21.01.09,\nSIMATIC IPC547E All versions prior to R1.30.0,\nSIMATIC IPC547G All versions prior to R1.23.0,\nSIMATIC IPC627D All versions prior to 19.02.11,\nSIMATIC IPC647D All versions prior to 19.01.14,\nSIMATIC IPC677D All versions prior to 19.02.11,\nSIMATIC IPC827D All versions prior to 19.02.11,\nSIMATIC IPC847D All versions prior to 19.01.14, and\nSIMATIC ITP1000 All versions prior to 23.01.04. A security vulnerability exists in the TLS implementation in versions prior to Intel AMT 12.0.5", "sources": [ { "db": "NVD", "id": "CVE-2018-3616" }, { "db": "JVNDB", "id": "JVNDB-2018-010878" }, { "db": "BID", "id": "106996" }, { "db": "VULHUB", "id": "VHN-133647" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-3616", "trust": 2.8 }, { "db": "ICS CERT", "id": "ICSA-19-043-05", "trust": 2.8 }, { "db": "BID", "id": "106996", "trust": 2.0 }, { "db": "SIEMENS", "id": "SSA-377318", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2018-010878", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201809-608", "trust": 0.7 }, { "db": "AUSCERT", "id": "ESB-2019.0444", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-133647", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-133647" }, { "db": "BID", "id": "106996" }, { "db": "JVNDB", "id": "JVNDB-2018-010878" }, { "db": "CNNVD", "id": "CNNVD-201809-608" }, { "db": "NVD", "id": "CVE-2018-3616" } ] }, "id": "VAR-201809-1104", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-133647" } ], "trust": 0.6769231 }, "last_update_date": "2024-11-23T21:38:17.005000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "INTEL-SA-00141", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "title": "Intel Active Management Technology Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=84867" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010878" }, { "db": "CNNVD", "id": "CNNVD-201809-608" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-310", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-133647" }, { "db": "JVNDB", "id": "JVNDB-2018-010878" }, { "db": "NVD", "id": "CVE-2018-3616" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.4, "url": "https://ics-cert.us-cert.gov/advisories/icsa-19-043-05" }, { "trust": 2.9, "url": "http://www.securityfocus.com/bid/106996" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "trust": 1.6, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03876en_us" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3616" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-3616" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/75474" }, { "trust": 0.3, "url": "http://subscriber.communications.siemens.com/" }, { "trust": 0.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026amp;docid=emr_na-hpesbhf03876en_us" } ], "sources": [ { "db": "VULHUB", "id": "VHN-133647" }, { "db": "BID", "id": "106996" }, { "db": "JVNDB", "id": "JVNDB-2018-010878" }, { "db": "CNNVD", "id": "CNNVD-201809-608" }, { "db": "NVD", "id": "CVE-2018-3616" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-133647" }, { "db": "BID", "id": "106996" }, { "db": "JVNDB", "id": "JVNDB-2018-010878" }, { "db": "CNNVD", "id": "CNNVD-201809-608" }, { "db": "NVD", "id": "CVE-2018-3616" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-09-12T00:00:00", "db": "VULHUB", "id": "VHN-133647" }, { "date": "2019-02-12T00:00:00", "db": "BID", "id": "106996" }, { "date": "2018-12-27T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010878" }, { "date": "2018-09-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-608" }, { "date": "2018-09-12T19:29:02.403000", "db": "NVD", "id": "CVE-2018-3616" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-133647" }, { "date": "2019-02-12T00:00:00", "db": "BID", "id": "106996" }, { "date": "2019-02-13T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-010878" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201809-608" }, { "date": "2024-11-21T04:05:46.667000", "db": "NVD", "id": "CVE-2018-3616" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-608" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Active Management Technology Cryptographic vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-010878" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201809-608" } ], "trust": 0.6 } }
var-202006-0241
Vulnerability from variot
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel 06_3DH and Intel 06_9EH are both a central processing unit (CPU) product of Intel Corporation of the United States. Security vulnerabilities exist in several Intel products. The following products and versions are affected: Intel Celeron 1000M; Celeron 1005M; Celeron 1007U; Celeron 1019Y; Celeron 1020m, etc. (CVE-2020-12654).
The microcode update for HEDT and Xeon CPUs with signature 0x50654 which was reverted in DSA 4565-2 is now included again with a fixed release.
The upstream update for Skylake-U/Y (signature 0x406e3) had to be excluded from this update due to reported hangs on boot.
For the stable distribution (buster), these problems have been fixed in version 3.20200609.2~deb10u1.
We recommend that you upgrade your intel-microcode packages.
For the detailed security status of intel-microcode please refer to its security tracker page at: https://security-tracker.debian.org/tracker/intel-microcode
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAl7iSvVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2 NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND z0RH6g/9FYOaN5XyFFC8jVEmfdIl0pa8SqEH2+V1s27pAEOMhGAXuLrUms9wDq0J IoM54q/dz3rH3GiSi5nNqQDxLGx40DNSM5CCdCZIC22YvALS3aYsqpSSlDiyQZSb Im7isH8ntWIc3bedPWzfhui4VA19p8gnbFUetts3fp+uPeimd/QfPnJDN8wHUAL1 V2JzHMYD8v9axenbOxuWSArSnbubEtwpmHfhMzIMkE5150qhyofpzPBsKGoASa7q kPrwbUKBC11dGi+sV49rpXTf/ml7KDUDIrsA75sLC9WhckBcMdAkkVPLJyytAZ6A SqaOVJv+j0wVmhTtIqPxjvYCvX0y8i6NyQi+aliqzq7uEiQtaPQV8sWgDhyhTWga kxxiNuLfcuiEKkKToHdrkLLI1JiisqQTcwyRHg6k3X8+sNmKe6vFu3KzVbLo8+MH c3zEDQHP7XHm/euneb5ZFdg7+Rli03KWFm8/LNJQhrDcsFU/Si5268OwnzpGydwc eaIwuHtc8R64q+m5Aujo7X7kKk67zN7XhmX0nbr9Egni7dhG3iVrMtF27BTPMcML Gzz1pjktlYiySJYON64N/ooZchwAoAEhM9F1yPREXNf6PfRQG3lNjX3UeC4Ci0Ay /NuaKQSSlwd3XOy/dajSEfceu8uI/RZQ3RccTZRtWT58qcnwAnE= =cQzh -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: microcode_ctl security, bug fix and enhancement update Advisory ID: RHSA-2021:3028-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:3028 Issue date: 2021-08-09 CVE Names: CVE-2020-0543 CVE-2020-0548 CVE-2020-0549 CVE-2020-8695 CVE-2020-8696 CVE-2020-8698 CVE-2020-24489 CVE-2020-24511 CVE-2020-24512 ==================================================================== 1. Summary:
An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64
- Description:
The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
-
hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)
-
hw: Vector Register Data Sampling (CVE-2020-0548)
-
hw: L1D Cache Eviction Sampling (CVE-2020-0549)
-
hw: vt-d related privilege escalation (CVE-2020-24489)
-
hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)
-
hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)
-
hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)
-
hw: Vector Register Leakage-Active (CVE-2020-8696)
-
hw: Fast forward store predictor (CVE-2020-8698)
-
Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1788786 - CVE-2020-0548 hw: Vector Register Data Sampling 1788788 - CVE-2020-0549 hw: L1D Cache Eviction Sampling 1827165 - CVE-2020-0543 hw: Special Register Buffer Data Sampling (SRBDS) 1828583 - CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface 1890355 - CVE-2020-8696 hw: Vector Register Leakage-Active 1890356 - CVE-2020-8698 hw: Fast forward store predictor 1897684 - [rhel-7.9.z] Re-enable 06-5e-03 (SKL-H/S, CPUID 0x506e3) latest microcode updates 1962650 - CVE-2020-24489 hw: vt-d related privilege escalation 1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors 1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: microcode_ctl-2.1-73.11.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: microcode_ctl-2.1-73.11.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: microcode_ctl-2.1-73.11.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: microcode_ctl-2.1-73.11.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.11.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2020-0543 https://access.redhat.com/security/cve/CVE-2020-0548 https://access.redhat.com/security/cve/CVE-2020-0549 https://access.redhat.com/security/cve/CVE-2020-8695 https://access.redhat.com/security/cve/CVE-2020-8696 https://access.redhat.com/security/cve/CVE-2020-8698 https://access.redhat.com/security/cve/CVE-2020-24489 https://access.redhat.com/security/cve/CVE-2020-24511 https://access.redhat.com/security/cve/CVE-2020-24512 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYRD++tzjgjWX9erEAQhA1A//eeO88DFGpTcHgCHrsXimUtK3MZX0RppT 5UOWuXgmPJniMPDALpkfTNTnNGASjBB+WDclaW2d/sZf52PzYLao5wGVIYdUx3Nl l9IvbGNMm0F7eI7aHdT2QnUhQQl1IpJrbmkhvBM2w85EmOfqlq+CpXnJMRXzoRdv sFPrWAo1opDNnBV6iYAnyULHFuWwcvU28n3JU945W8p/PvqJgSze77i4dmpzYkBj ljzVrIUl2pizBmnQMj03JJ+YeB8+oKb0uD2RdqHoxkUSFGH9OW6s/qytHu/eR4uL Y7WmIfHUxGsVRcmIjo/VaAvvWs4A3hdOL3nGdRAMQOKp+VoDcX7VDNURoxK/bkcJ OepHSyfWPCVXvOmU5l2ov1uzVQ/F+ajeevMehuzwQlTAIur5qE2eQ2Mwitfh/7WZ W3x67peCz51zVPtb7rkQfpzQzZKkjSAAclOYMzltv2PA5vSXZy8+hEqWZwqtesQn ltz36bjQMvRRhr1yGDbaFI5dcTB8T/eIkzmD6wPfbd7r7SEuE0GUd8Yf69VghGL2 f+mvR8oWb2x3RHXbpFm4aIt5mJHqIgfXDAohz7lXgLyJwQefyeJ5w+W8nOe+ZSK/ yvfiVQZz9tvPq8yqC87YWTA7zcnhoSmPvXRicJakpfJL/oz043Tc17jqxIra36sA UjXnNBNse8A=LIYI -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . (CVE-2020-0548)
It was discovered that on some Intel processors, data from the most recently evicted modified L1 data cache (L1D) line may be propagated into an unused (invalid) L1D fill buffer. ========================================================================= Ubuntu Security Notice USN-4393-1 June 10, 2020
linux vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.04 ESM
Summary:
Several security issues were fixed in the Linux kernel.
Software Description: - linux: Linux kernel
Details:
It was discovered that the Marvell WiFi-Ex Driver in the Linux kernel did not properly validate status lengths in messages received from an access point, leading to a buffer overflow. A physically proximate attacker controlling an access point could use this to construct messages that could possibly result in arbitrary code execution. (CVE-2020-12654)
It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. (CVE-2020-0543)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 12.04 ESM: linux-image-3.2.0-147-generic 3.2.0-147.194 linux-image-3.2.0-147-generic-pae 3.2.0-147.194 linux-image-3.2.0-147-highbank 3.2.0-147.194 linux-image-3.2.0-147-powerpc-smp 3.2.0-147.194 linux-image-3.2.0-147-powerpc64-smp 3.2.0-147.194 linux-image-3.2.0-147-virtual 3.2.0-147.194 linux-image-generic 3.2.0.147.161 linux-image-generic-pae 3.2.0.147.161 linux-image-highbank 3.2.0.147.161 linux-image-powerpc 3.2.0.147.161 linux-image-powerpc-smp 3.2.0.147.161 linux-image-powerpc64-smp 3.2.0.147.161 linux-image-server 3.2.0.147.161 linux-image-virtual 3.2.0.147.161
Please note that the mitigation for CVE-2020-0543 requires a processor microcode update to be applied, either from your system manufacturer or via the intel-microcode package. The kernel update for this issue provides the ability to disable the mitigation and to report vulnerability status.
After a standard system update you need to reboot your computer to make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202006-0241", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "core i3-3217ue", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8120", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1245 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7007u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4010y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7210u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4010u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 4405y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3560y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 3765u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g5400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-5675c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3240", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "19.10" }, { "model": "core i7-8705g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium a1018 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1125c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6310u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1270 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g3900te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3120m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 1037u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3450t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-9850h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3220t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc627e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "25.02.06" }, { "model": "core i7-8569u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 1000m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1505l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7820hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2124", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3229y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m5-6y54", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4430s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4030u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7920hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7300u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2146g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc427d", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "xeon e3-1505m v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2184g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7567u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1280 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3470", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6820hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2286m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8709g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6300u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core 4205u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4130", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1225 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc477e pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.14" }, { "model": "core i7-7700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7320t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6510u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m-5y10c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3840qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7100u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 3865u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic itp1000", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "23.01.08" }, { "model": "celeron 2957u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 1020m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6100e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3689y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1265l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4402ec", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3517ue", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4250u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3520m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8400h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7442eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1225 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1245 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2174g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1285l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8400b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 3965y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3570k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4700ec", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4160t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-5350u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7y75", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m3-7y30", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1501l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6567u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3439y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3570", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6870hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1286 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g1620t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4030y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4258u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4702mq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1220 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3220t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1585l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6300", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4100m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1268l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5700hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4590t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3555le", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4770s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1290 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1246 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1275 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g3930te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8300t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8350k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "threat intelligence exchange server", "scope": "lte", "trust": 1.0, "vendor": "mcafee", "version": "2.3.1" }, { "model": "pentium g5400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1271 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4750hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g3900t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3360m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8130u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10510u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc627d", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "core i7-3612qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g5500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic field pg m6", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "26.01.07" }, { "model": "xeon e3-1505l v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4288u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4810mq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4370", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 927ue", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m-5y70", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1275 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1545m v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4350u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3260", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1258l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2276me", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4005u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-5015u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7440eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7102e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4570r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-8950hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 2981u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4020y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6100h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3350p", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g3920", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-5575r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1240l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 5305u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m-5y10", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3610me", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1105c v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3610qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2244g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1220 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-5010u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g4900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1105c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1270 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1281 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1515m v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "leap", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "15.1" }, { "model": "celeron 1020e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2124g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4500u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-5005u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3635qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5750hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4360", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7101te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1225 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4790t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6100u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8300h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-9700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4712mq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7600u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4785t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7360u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2234", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8020", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4300u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3317u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4540", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g5600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "18.04" }, { "model": "core m7-6y75", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4520", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4360t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3430", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6110u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6650u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3217u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 725c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6440eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4012y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5950hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4860hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8259u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc427e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.14" }, { "model": "xeon e3-1505m v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6360u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3320m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4200u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7167u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3340m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m-5y10a", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3420t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8100t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 1019y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3765u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4710hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3225", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3210m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium gold 6405u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4670r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4600u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1245 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3210", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8700b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1278l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7560u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3667u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8670t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3825u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g2140 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g5500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6267u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "threat intelligence exchange server", "scope": "gte", "trust": 1.0, "vendor": "mcafee", "version": "2.0.0" }, { "model": "celeron g1610", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7260u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4670k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5775c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9600kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4760hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m3-6y30", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1230 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6820hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4770r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4400te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1558l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6500te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g3902e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3250t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1240 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2276g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4278u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5650u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3240t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3340s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4210y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7110u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3450", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic field pg m5", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "22.01.08" }, { "model": "core i5-4690s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8400t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6100", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3205u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8265u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g1820t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6500u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7y57", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3940xm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8700t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc677d", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "celeron 2980u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g3920t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4158u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "20.04" }, { "model": "core i9-9900k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3460", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1501m v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2284g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3556u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-5350", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7020u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1220l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6820eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3227u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g2120t v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4210h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1578l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4590", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3920xm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3770k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3558u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4570", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4770t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7120", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4220y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1280 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8100h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2278g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4300y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4900mq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5850hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g4920", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4370t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9880h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3250", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6120t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2226ge", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1245 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1230l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m5-6y57", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8809g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8420", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g2030 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m-5y51", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1220 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4690t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6822eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g2100t v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4100u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1286l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6100t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9900kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 2129y v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1225 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8250u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1260l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 2030m v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc527g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.4.0" }, { "model": "core 9750hf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3570t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3450s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m3-8100y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core 4410y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 1405 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3560m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6320t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3330", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6700te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2126g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8557u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4330t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc847d", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "pentium g5420", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1240 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g2010 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3770t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "12.04" }, { "model": "pentium g2130 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8210y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3230m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7300hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1235 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1241 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3250", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g1850", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10210y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 1017u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4670", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3220", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc477e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.14" }, { "model": "core i3-4110m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8850h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4308u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8550", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4130t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7200u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 1047ue", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3615qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5600u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-5157u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1240 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7267u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3632qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3470s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6660u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4120u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4202y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 2020m v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 2955u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3260t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2288g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-i3-8100h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7700hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "leap", "scope": "eq", "trust": 1.0, "vendor": "opensuse", "version": "15.2" }, { "model": "celeron g3940", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3612qe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 2127u v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3820qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2186m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3537u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8500t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4770hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4170", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4770k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7510u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4440s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1125c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4150t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4350", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core 4415y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6300t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3440", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3380m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1575m v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-5257u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2134", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1280 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3340", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4590s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3770", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6770hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6350hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1235l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8420t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4440", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4260u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5557u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8500b", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8000", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4765t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6120", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2276ml", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 3755u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6400", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4710mq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7500u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-2115c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4025u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g2020 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7100e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2176m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc547g", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "r1.28.0" }, { "model": "celeron g1840", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4150", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8145u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4670s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6260u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4722hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4790s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7740x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "31" }, { "model": "core i5-10210u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g3900", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i9-9980hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic field pg m4", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "celeron g1840t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4570s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g4950", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g1610t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6287u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6600u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3450", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4210u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7440hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3610qe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3615qe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4460", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g4900t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4980hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 3955u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4558u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1220 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2278gel", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2224g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc647e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "25.02.06" }, { "model": "core 8269u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3805u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9400h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7820hk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3550s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-5200u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2254me", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "14.04" }, { "model": "xeon e3-1270", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3115c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3240", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4670t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7660u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1535m v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g1630", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "32" }, { "model": "core i5-3475s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6200u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1226 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1280 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3330s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core 9300h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8565u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4700eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6700", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium b925c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2236", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7120t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 4405u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1265l", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3470t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4170t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4702ec", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3420", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1275l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium b915c", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6920hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8670", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8510y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4578u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4700hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-9700kf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3460t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g5420t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2144g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2136", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7101e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4870hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3240t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2224", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3120me", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-7820eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3540m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1275 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-10510y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4200y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4330", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4520t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc647d", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "core m-5y3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 2970m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1285 v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8600", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5550u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8706g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 1007u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4790", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8559u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4700mq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4690", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2274g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3550", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3258", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-9400f", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "threat intelligence exchange server", "scope": "eq", "trust": 1.0, "vendor": "mcafee", "version": "3.0.0" }, { "model": "core i5-3437u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4702hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7340", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3517u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2276m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3770s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6210u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4712hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6700hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6100te", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6320", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4550u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4460t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc827d", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "core i3-6167u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-5287u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc847e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "25.02.06" }, { "model": "celeron g1820", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1585 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1230 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3570s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8305g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g2120 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2246g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1270 v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc3000 smart", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "1.b" }, { "model": "core i5-6442eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4800mq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-5250u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8650u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7640x", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2278ge", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8310y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8650k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6440hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6300hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3440t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1240l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6560u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1268l v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8650", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1276 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1240 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1230 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "ubuntu linux", "scope": "eq", "trust": 1.0, "vendor": "canonical", "version": "16.04" }, { "model": "core i3-3130m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1220l v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g4930", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3110m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8750h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc347e", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "core i5-10310y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4570t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g2020t v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1231 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3720qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3687u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simotion p320-4e", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "pentium g3470", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3561y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-6600k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1230 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5850eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4910mq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3630qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8500", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3427u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1565l v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6700k", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-6970hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8200y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8365u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4430", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7500u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4960hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7130u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g1830", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4350t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8560u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g1620", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3665u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2176g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 3965u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8550u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core m-5y71", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8600t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4720hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1285 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron 1005m", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3337u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1275 v5", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8109u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-10110y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-7100h", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 4415u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1265l v4", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 2117u v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7y54", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4610y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-5006u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simotion p320-4s", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "core 5405u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-8300", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1285 v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4510u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-3339y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5700eq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2186g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4770", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8665u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4420t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2254ml", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc677e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "25.02.06" }, { "model": "core i5-4302y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3245", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-3740qm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-4460s", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-3250t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4160", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e-2226g", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-8350u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc477d", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "core i3-8000t", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5775r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4650u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "celeron g3930e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4950hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g4420", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1535m v6", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-7287u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium 3215u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "simatic ipc547e", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "celeron 3855u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4850hq", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "xeon e3-1221 v3", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-8500y", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g2030t v2", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-4340", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-5500u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i5-5675r", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i7-4771", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "pentium g3220", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-5020u", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "core i3-6102e", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null } ], "sources": [ { "db": "NVD", "id": "CVE-2020-0543" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "163956" }, { "db": "PACKETSTORM", "id": "163757" }, { "db": "PACKETSTORM", "id": "163758" }, { "db": "PACKETSTORM", "id": "163772" } ], "trust": 0.4 }, "cve": "CVE-2020-0543", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2020-0543", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-161977", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-0543", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-0543", "trust": 1.0, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-161977", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2020-0543", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-161977" }, { "db": "VULMON", "id": "CVE-2020-0543" }, { "db": "NVD", "id": "CVE-2020-0543" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel 06_3DH and Intel 06_9EH are both a central processing unit (CPU) product of Intel Corporation of the United States. Security vulnerabilities exist in several Intel products. The following products and versions are affected: Intel Celeron 1000M; Celeron 1005M; Celeron 1007U; Celeron 1019Y; Celeron 1020m, etc. (CVE-2020-12654). \n\nThe microcode update for HEDT and Xeon CPUs with signature 0x50654 which\nwas reverted in DSA 4565-2 is now included again with a fixed release. \n\nThe upstream update for Skylake-U/Y (signature 0x406e3) had to be\nexcluded from this update due to reported hangs on boot. \n\nFor the stable distribution (buster), these problems have been fixed in\nversion 3.20200609.2~deb10u1. \n\nWe recommend that you upgrade your intel-microcode packages. \n\nFor the detailed security status of intel-microcode please refer to its\nsecurity tracker page at:\nhttps://security-tracker.debian.org/tracker/intel-microcode\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\n/NuaKQSSlwd3XOy/dajSEfceu8uI/RZQ3RccTZRtWT58qcnwAnE=\n=cQzh\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: microcode_ctl security, bug fix and enhancement update\nAdvisory ID: RHSA-2021:3028-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:3028\nIssue date: 2021-08-09\nCVE Names: CVE-2020-0543 CVE-2020-0548 CVE-2020-0549\n CVE-2020-8695 CVE-2020-8696 CVE-2020-8698\n CVE-2020-24489 CVE-2020-24511 CVE-2020-24512\n====================================================================\n1. Summary:\n\nAn update for microcode_ctl is now available for Red Hat Enterprise Linux\n7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. Description:\n\nThe microcode_ctl packages provide microcode updates for Intel. \n\nSecurity Fix(es):\n\n* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)\n\n* hw: Vector Register Data Sampling (CVE-2020-0548)\n\n* hw: L1D Cache Eviction Sampling (CVE-2020-0549)\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* hw: improper isolation of shared resources in some Intel Processors\n(CVE-2020-24511)\n\n* hw: observable timing discrepancy in some Intel Processors\n(CVE-2020-24512)\n\n* hw: Information disclosure issue in Intel SGX via RAPL interface\n(CVE-2020-8695)\n\n* hw: Vector Register Leakage-Active (CVE-2020-8696)\n\n* hw: Fast forward store predictor (CVE-2020-8698)\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1788786 - CVE-2020-0548 hw: Vector Register Data Sampling\n1788788 - CVE-2020-0549 hw: L1D Cache Eviction Sampling\n1827165 - CVE-2020-0543 hw: Special Register Buffer Data Sampling (SRBDS)\n1828583 - CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface\n1890355 - CVE-2020-8696 hw: Vector Register Leakage-Active\n1890356 - CVE-2020-8698 hw: Fast forward store predictor\n1897684 - [rhel-7.9.z] Re-enable 06-5e-03 (SKL-H/S, CPUID 0x506e3) latest microcode updates\n1962650 - CVE-2020-24489 hw: vt-d related privilege escalation\n1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors\n1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.11.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.11.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-0543\nhttps://access.redhat.com/security/cve/CVE-2020-0548\nhttps://access.redhat.com/security/cve/CVE-2020-0549\nhttps://access.redhat.com/security/cve/CVE-2020-8695\nhttps://access.redhat.com/security/cve/CVE-2020-8696\nhttps://access.redhat.com/security/cve/CVE-2020-8698\nhttps://access.redhat.com/security/cve/CVE-2020-24489\nhttps://access.redhat.com/security/cve/CVE-2020-24511\nhttps://access.redhat.com/security/cve/CVE-2020-24512\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nUjXnNBNse8A=LIYI\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. (CVE-2020-0548)\n\nIt was discovered that on some Intel processors, data from the most\nrecently evicted modified L1 data cache (L1D) line may be propagated into\nan unused (invalid) L1D fill buffer. =========================================================================\nUbuntu Security Notice USN-4393-1\nJune 10, 2020\n\nlinux vulnerabilities\n=========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 12.04 ESM\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. \n\nSoftware Description:\n- linux: Linux kernel\n\nDetails:\n\nIt was discovered that the Marvell WiFi-Ex Driver in the Linux kernel did\nnot properly validate status lengths in messages received from an access\npoint, leading to a buffer overflow. A physically proximate attacker\ncontrolling an access point could use this to construct messages that could\npossibly result in arbitrary code execution. (CVE-2020-12654)\n\nIt was discovered that memory contents previously stored in\nmicroarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY\nread operations on Intel client and Xeon E3 processors may be briefly\nexposed to processes on the same or different processor cores. A local\nattacker could use this to expose sensitive information. (CVE-2020-0543)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 12.04 ESM:\n linux-image-3.2.0-147-generic 3.2.0-147.194\n linux-image-3.2.0-147-generic-pae 3.2.0-147.194\n linux-image-3.2.0-147-highbank 3.2.0-147.194\n linux-image-3.2.0-147-powerpc-smp 3.2.0-147.194\n linux-image-3.2.0-147-powerpc64-smp 3.2.0-147.194\n linux-image-3.2.0-147-virtual 3.2.0-147.194\n linux-image-generic 3.2.0.147.161\n linux-image-generic-pae 3.2.0.147.161\n linux-image-highbank 3.2.0.147.161\n linux-image-powerpc 3.2.0.147.161\n linux-image-powerpc-smp 3.2.0.147.161\n linux-image-powerpc64-smp 3.2.0.147.161\n linux-image-server 3.2.0.147.161\n linux-image-virtual 3.2.0.147.161\n\nPlease note that the mitigation for CVE-2020-0543 requires a processor\nmicrocode update to be applied, either from your system manufacturer\nor via the intel-microcode package. The kernel update for this issue\nprovides the ability to disable the mitigation and to report\nvulnerability status. \n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nATTENTION: Due to an unavoidable ABI change the kernel updates have\nbeen given a new version number, which requires you to recompile and\nreinstall all third party kernel modules you might have installed. \nUnless you manually uninstalled the standard kernel metapackages\n(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,\nlinux-powerpc), a standard system upgrade will automatically perform\nthis as well", "sources": [ { "db": "NVD", "id": "CVE-2020-0543" }, { "db": "VULHUB", "id": "VHN-161977" }, { "db": "VULMON", "id": "CVE-2020-0543" }, { "db": "PACKETSTORM", "id": "168851" }, { "db": "PACKETSTORM", "id": "163956" }, { "db": "PACKETSTORM", "id": "163757" }, { "db": "PACKETSTORM", "id": "163758" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "158005" }, { "db": "PACKETSTORM", "id": "158010" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-0543", "trust": 1.9 }, { "db": "MCAFEE", "id": "SB10318", "trust": 1.2 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2020/07/14/5", "trust": 1.2 }, { "db": "SIEMENS", "id": "SSA-534763", "trust": 1.2 }, { "db": "PACKETSTORM", "id": "158010", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "158005", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "157993", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158183", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158015", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "168421", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158198", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158189", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "157997", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158008", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158039", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158250", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158237", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158355", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158238", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158197", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "158190", "trust": 0.1 }, { "db": "CNNVD", "id": "CNNVD-202006-630", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-161977", "trust": 0.1 }, { "db": "ICS CERT", "id": "ICSA-20-252-07", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-0543", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "168851", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163956", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163757", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163758", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163772", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-161977" }, { "db": "VULMON", "id": "CVE-2020-0543" }, { "db": "PACKETSTORM", "id": "168851" }, { "db": "PACKETSTORM", "id": "163956" }, { "db": "PACKETSTORM", "id": "163757" }, { "db": "PACKETSTORM", "id": "163758" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "158005" }, { "db": "PACKETSTORM", "id": "158010" }, { "db": "NVD", "id": "CVE-2020-0543" } ] }, "id": "VAR-202006-0241", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-161977" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T21:15:08.266000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2020/06/09/june_2020_patch_tuesday/" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202707 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202680 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202706 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202677 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202432 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202771 - Security Advisory" }, { "title": "Ubuntu Security Notice: linux vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4393-1" }, { "title": "Ubuntu Security Notice: intel-microcode vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4385-1" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202433 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202758 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202431 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202842 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202757 - Security Advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202679 - Security Advisory" }, { "title": "Ubuntu Security Notice: intel-microcode regression", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4385-2" }, { "title": "Ubuntu Security Notice: linux, linux-lts-trusty vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4392-1" }, { "title": "Red Hat: Moderate: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202430 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202667 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202427 - Security Advisory" }, { "title": "Red Hat: Important: kernel-rt security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202428 - Security Advisory" }, { "title": "Ubuntu Security Notice: linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4390-1" }, { "title": "Ubuntu Security Notice: linux, linux-aws, linux-aws-5.3, linux-azure, linux-azure-5.3, linux-gcp, linux-gcp-5.3, linux-gke-5.3, linux-hwe, linux-kvm, linux-oracle, linux-oracle-5.3 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4387-1" }, { "title": "Amazon Linux AMI: ALAS-2020-1396", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2020-1396" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2020-0543 log" }, { "title": "Debian Security Advisories: DSA-4701-1 intel-microcode -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=954d2c33c2a4127c33b5f47731100050" }, { "title": "Red Hat: Important: kernel security, bug fix, and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20203019 - Security Advisory" }, { "title": "Ubuntu Security Notice: linux-gke-5.0, linux-oem-osp1 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4388-1" }, { "title": "Ubuntu Security Notice: linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oracle vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4389-1" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=90d5b24197f663c23e5af8c971118de6" }, { "title": "Arch Linux Advisories: [ASA-202006-11] intel-ucode: information disclosure", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-202006-11" }, { "title": "Ubuntu Security Notice: linux, linux-aws, linux-kvm vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-4391-1" }, { "title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03668 rev. 4 - Intel\u00ae 2020.1 IPU Special Register Buffer Data Sampling and Improper Data Forwarding", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=85333ba63923f2976a4b451bcd61fd00" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20202429 - Security Advisory" }, { "title": "Citrix Security Bulletins: Citrix Hypervisor Security Updates", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=2b9d5984faab280f63afcb8a237cd1d2" }, { "title": "Amazon Linux 2: ALAS2-2020-1444", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2020-1444" }, { "title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03668 rev. 4 - Intel\u00ae 2020.1 IPU Special Register Buffer Data Sampling and Improper Data Forwarding", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=2a42c56bb55866dbb1c5a179d43a79fa" }, { "title": "Debian Security Advisories: DSA-4699-1 linux -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=24f2948c681d56f3f30c8ed6de9c4c9d" }, { "title": "Amazon Linux AMI: ALAS-2020-1401", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2020-1401" }, { "title": "Amazon Linux 2: ALAS2KERNEL-5.4-2022-012", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2KERNEL-5.4-2022-012" }, { "title": "Debian Security Advisories: DSA-4698-1 linux -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=88a848047667226a68bbe6de9bb29095" }, { "title": "Speculative-execution-attacks", "trust": 0.1, "url": "https://github.com/Stefan-Radu/Speculative-execution-attacks " }, { "title": "get-nist-details", "trust": 0.1, "url": "https://github.com/dmarcuccio-solace/get-nist-details " }, { "title": "spectre-meltdown", "trust": 0.1, "url": "https://github.com/edsonjt81/spectre-meltdown " }, { "title": "spectre-meltdown-checker", "trust": 0.1, "url": "https://github.com/speed47/spectre-meltdown-checker " }, { "title": "", "trust": 0.1, "url": "https://github.com/merlinepedra25/spectre-meltdown-checker " }, { "title": "", "trust": 0.1, "url": "https://github.com/merlinepedra/spectre-meltdown-checker " }, { "title": "hardware-attacks-state-of-the-art", "trust": 0.1, "url": "https://github.com/codexlynx/hardware-attacks-state-of-the-art " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/critical-intel-flaws-fixed-in-active-management-technology/156458/" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-0543" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-459", "trust": 1.1 }, { "problemtype": "CWE-200", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-161977" }, { "db": "NVD", "id": "CVE-2020-0543" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.3, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html" }, { "trust": 1.3, "url": "https://usn.ubuntu.com/4393-1/" }, { "trust": 1.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf" }, { "trust": 1.2, "url": "http://www.openwall.com/lists/oss-security/2020/07/14/5" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/4385-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/4387-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/4388-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/4389-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/4390-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/4391-1/" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/4392-1/" }, { "trust": 1.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10318" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/nqzmoshltbbiecennxa6m7dn5feed4ki/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/grfc7uapkaffh5wx3amdubvhlkyqa2nz/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/dt2vkdmq3i37nbnj256a2exr7ojhxxkz/" }, { "trust": 1.0, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/t5oum24zc43g4idt3jucihjtsdxjsk6y/" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0543" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0549" }, { "trust": 0.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0548" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8696" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-24511" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-8698" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24512" }, { "trust": 0.4, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-24512" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24489" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-24489" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8698" }, { "trust": 0.4, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.4, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-0543" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-8695" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8695" }, { "trust": 0.4, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-0549" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-8696" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24511" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-0548" }, { "trust": 0.4, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/dt2vkdmq3i37nbnj256a2exr7ojhxxkz/" }, { "trust": 0.2, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/grfc7uapkaffh5wx3amdubvhlkyqa2nz/" }, { "trust": 0.2, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/nqzmoshltbbiecennxa6m7dn5feed4ki/" }, { "trust": 0.2, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/t5oum24zc43g4idt3jucihjtsdxjsk6y/" }, { "trust": 0.2, "url": "https://wiki.ubuntu.com/securityteam/knowledgebase/srbds" }, { "trust": 0.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026amp;id=sb10318" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/459.html" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:2707" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-20-252-07" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/intel-microcode" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3322" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3027" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3028" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3029" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.20.04.0" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4385-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.19.10.0" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.16.04.0" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20200609.0ubuntu0.18.04.0" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4393-1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12654" } ], "sources": [ { "db": "VULHUB", "id": "VHN-161977" }, { "db": "VULMON", "id": "CVE-2020-0543" }, { "db": "PACKETSTORM", "id": "168851" }, { "db": "PACKETSTORM", "id": "163956" }, { "db": "PACKETSTORM", "id": "163757" }, { "db": "PACKETSTORM", "id": "163758" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "158005" }, { "db": "PACKETSTORM", "id": "158010" }, { "db": "NVD", "id": "CVE-2020-0543" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-161977" }, { "db": "VULMON", "id": "CVE-2020-0543" }, { "db": "PACKETSTORM", "id": "168851" }, { "db": "PACKETSTORM", "id": "163956" }, { "db": "PACKETSTORM", "id": "163757" }, { "db": "PACKETSTORM", "id": "163758" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "158005" }, { "db": "PACKETSTORM", "id": "158010" }, { "db": "NVD", "id": "CVE-2020-0543" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-06-15T00:00:00", "db": "VULHUB", "id": "VHN-161977" }, { "date": "2020-06-15T00:00:00", "db": "VULMON", "id": "CVE-2020-0543" }, { "date": "2020-06-28T19:12:00", "db": "PACKETSTORM", "id": "168851" }, { "date": "2021-08-31T15:44:21", "db": "PACKETSTORM", "id": "163956" }, { "date": "2021-08-09T14:15:37", "db": "PACKETSTORM", "id": "163757" }, { "date": "2021-08-09T14:15:45", "db": "PACKETSTORM", "id": "163758" }, { "date": "2021-08-10T14:49:53", "db": "PACKETSTORM", "id": "163772" }, { "date": "2020-06-10T15:06:11", "db": "PACKETSTORM", "id": "158005" }, { "date": "2020-06-10T15:08:12", "db": "PACKETSTORM", "id": "158010" }, { "date": "2020-06-15T14:15:11.207000", "db": "NVD", "id": "CVE-2020-0543" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-28T00:00:00", "db": "VULHUB", "id": "VHN-161977" }, { "date": "2022-04-28T00:00:00", "db": "VULMON", "id": "CVE-2020-0543" }, { "date": "2024-11-21T04:53:42.440000", "db": "NVD", "id": "CVE-2020-0543" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "PACKETSTORM", "id": "158005" }, { "db": "PACKETSTORM", "id": "158010" } ], "trust": 0.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Debian Security Advisory 4701-1", "sources": [ { "db": "PACKETSTORM", "id": "168851" } ], "trust": 0.1 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "overflow, arbitrary, code execution", "sources": [ { "db": "PACKETSTORM", "id": "158010" } ], "trust": 0.1 } }
var-201711-0651
Vulnerability from variot
Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege. Intel Manageability Engine The Intel Management Engine is Intel's thermal management driver for its desktop family of chipsets. Failed exploits may result in denial-of-service conditions. Intel Manageability Engine versions 8.x, 9.x, 10.x, 11.0,11.5, 11.6, 11.7, 11.10, and 11.20 are vulnerable. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. Active Management Technology (AMT) is one of the active management components. The following products and firmware are affected: Intel Manageability Engine Firmware Version 8.x, Version 9.x, Version 10.x, Version 11.0, Version 11.5, Version 11.6, Version 11.7, Version 11.10, Version 11.20; Intel 6th, 7th and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201711-0651", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "manageability engine", "scope": "eq", "trust": 2.5, "vendor": "intel", "version": "11.7" }, { "model": "manageability engine", "scope": "eq", "trust": 2.5, "vendor": "intel", "version": "11.6" }, { "model": "manageability engine", "scope": "eq", "trust": 2.5, "vendor": "intel", "version": "11.5" }, { "model": "manageability engine", "scope": "eq", "trust": 2.5, "vendor": "intel", "version": "11.20" }, { "model": "manageability engine", "scope": "eq", "trust": 2.5, "vendor": "intel", "version": "11.10" }, { "model": "manageability engine", "scope": "eq", "trust": 2.5, "vendor": "intel", "version": "11.0" }, { "model": "active management technology", "scope": "eq", "trust": 1.6, "vendor": "intel", "version": null }, { "model": "simatic ipc827c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.2.61.3535" }, { "model": "rog maximus ix extreme", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "sinumerik pcu50.5-p", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.2.61.3535" }, { "model": "b150m-c", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z270h gaming\\/k1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "q170t v2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simotion p320-4s", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "17.02.06.83.1" }, { "model": "rog strix z270i gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b250 mining expert", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime j3355i-c", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "ex-b150m-v3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "q170m2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z370-i gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170m-e d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime b250m-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "sabertooth z170 mark 1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150 pro gaming\\/aura", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h170-plus d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z370-h gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "q170t", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-c2\\/tf", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus x code", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "manageability engine", "scope": "lte", "trust": 1.0, "vendor": "intel", "version": "9.1.41.3024" }, { "model": "manageability engine", "scope": "lte", "trust": 1.0, "vendor": "intel", "version": "10.0.55.3000" }, { "model": "h110m-c2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z370-e gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc547d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "7.1.91.3272" }, { "model": "prime z270-p", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z270h gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "tuf z370-plus gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h170 pro gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc627c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.2.61.3535" }, { "model": "prime z270-k", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc677d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "9.1.41.3024" }, { "model": "b150m-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc847c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.2.61.3535" }, { "model": "h110i-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-ks", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170i pro gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-e\\/m.2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime h110m-p", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h170m-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-c", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc827d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "9.1.41.3024" }, { "model": "z170m-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b250-mr", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "pio-b250i", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-c\\/hdmi", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b250m-f plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime b250m-d", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170-p", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus ix formula", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc477d", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "simatic field pg m5", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "22.01.04" }, { "model": "rog strix b250f gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h170m-plus\\/br", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170 pro gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-a\\/dp", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150-pro d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime h110m2\\/fpt", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc647d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "9.1.41.3024" }, { "model": "z170-ar", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h170-pro\\/usb 3.1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-k x", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic itp1000", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "23.01.03" }, { "model": "rog maximus ix hero", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h170i-pro", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-cs", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z270f gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "manageability engine", "scope": "gte", "trust": 1.0, "vendor": "intel", "version": "9.0.0.0" }, { "model": "ex-h110m-v", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus x formula", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "manageability engine", "scope": "gte", "trust": 1.0, "vendor": "intel", "version": "8.0.0.0" }, { "model": "manageability engine", "scope": "lte", "trust": 1.0, "vendor": "intel", "version": "8.1.71.3608" }, { "model": "b150-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-a d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170-k", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime h270-pro", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc477d pro", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "h170-pro", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-ts", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m pro gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime b250-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-v plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "q170m-cm-b", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z370-g gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "ex-b250-v7", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-k d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-ks r1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus viii gene", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110s2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "ex-b250m-v", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime b250m-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus viii formula", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-c\\/br", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "q170s1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "tuf z370-pro gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime z270-ar", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-d", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc627d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "9.1.41.3024" }, { "model": "ex-h110m-v3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime z270m-plus\\/br", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170-deluxe", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "q170m-c", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "ex-b250m-v3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "tuf z270 mark 2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170-p d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix b250g gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix h270f gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-k d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus ix apex", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc647c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.2.61.3535" }, { "model": "b150m-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-e", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-r", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime z270-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc847d", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "9.1.41.3024" }, { "model": "rog maximus viii ranger", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-f", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-f plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-a\\/m.2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix b250h gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z370-f gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "pio-b150m", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150 pro gaming d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "tuf z270 mark 1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus viii hero alpha", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic field pg m4", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "18.01.06" }, { "model": "z170-pro", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z270e gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus viii extreme", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150i pro gaming\\/aura", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus viii hero", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150i pro gaming\\/wifi\\/aura", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-a d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "q170m2\\/cdm\\/si", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170m-plus\\/br", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "trooper h110 d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime b250-pro", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170 pro gaming\\/aura", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime q270m-c", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime z370-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-plus d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "trooper b150 d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime h270-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc427e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.07" }, { "model": "h110m-d\\/exper\\/si", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime z270m-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime h110m2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150 pro gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-a\\/m.2", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110t-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170-premium", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110s1", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-cs x", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime b250m-plus\\/br", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "ex-b150m-v5", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime z370-p", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime b250-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150-pro", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "sabertooth z170 s", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-c\\/br", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-c\\/ps", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-k", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-cs\\/br", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus x hero", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus ix code", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "z170-e", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic field pg m3", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.2.61.3535" }, { "model": "prime b250m-k", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog maximus x apex", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "q270m-cm-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc677c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.2.61.3535" }, { "model": "h170m-e d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b250-s", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc427d", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": null }, { "model": "ex-b250m-v5", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "sinumerik pcu50.5-c", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "6.2.61.3535" }, { "model": "h110m-p\\/dvi", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix b250i gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-c d3", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110t", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b250m-c pro", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "b150m-k", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime h270m-plus", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc547e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "9.1.41.3024" }, { "model": "rog strix h270i gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-d", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "manageability engine", "scope": "gte", "trust": 1.0, "vendor": "intel", "version": "10.0.0.0" }, { "model": "rog maximus viii impact", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "simatic ipc477e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.07" }, { "model": "ex-b150-v7", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "ex-b150m-v", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime b250m-c", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "q270-s", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "rog strix z270g gaming", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "prime b250m-j", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "h110m-a", "scope": "eq", "trust": 1.0, "vendor": "asus", "version": null }, { "model": "manageability engine", "scope": "eq", "trust": 0.9, "vendor": "intel", "version": "9.0" }, { "model": "manageability engine", "scope": "eq", "trust": 0.9, "vendor": "intel", "version": "8.0" }, { "model": "manageability engine", "scope": "eq", "trust": 0.9, "vendor": "intel", "version": "10.0" }, { "model": "active management technology", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "manageability engine", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": null, "scope": "eq", "trust": 0.6, "vendor": "manageability engine", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "manageability engine", "version": "11.0" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "manageability engine", "version": "11.5" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "manageability engine", "version": "11.6" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "manageability engine", "version": "11.7" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "manageability engine", "version": "11.10" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "manageability engine", "version": "11.20" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "active management", "version": null } ], "sources": [ { "db": "IVD", "id": "e2e06b61-39ab-11e9-9e0b-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2017-37852" }, { "db": "BID", "id": "101920" }, { "db": "JVNDB", "id": "JVNDB-2017-010525" }, { "db": "CNNVD", "id": "CNNVD-201711-880" }, { "db": "NVD", "id": "CVE-2017-5712" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:intel:active_management_technology_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:manageability_engine_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-010525" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "101920" } ], "trust": 0.3 }, "cve": "CVE-2017-5712", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2017-5712", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2017-37852", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "e2e06b61-39ab-11e9-9e0b-000c29342cb1", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.9 [IVD]" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "VHN-113915", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.2, "id": "CVE-2017-5712", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.2, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2017-5712", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-5712", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2017-5712", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2017-37852", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201711-880", "trust": 0.6, "value": "HIGH" }, { "author": "IVD", "id": "e2e06b61-39ab-11e9-9e0b-000c29342cb1", "trust": 0.2, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-113915", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "IVD", "id": "e2e06b61-39ab-11e9-9e0b-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2017-37852" }, { "db": "VULHUB", "id": "VHN-113915" }, { "db": "JVNDB", "id": "JVNDB-2017-010525" }, { "db": "CNNVD", "id": "CNNVD-201711-880" }, { "db": "NVD", "id": "CVE-2017-5712" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege. Intel Manageability Engine The Intel Management Engine is Intel\u0027s thermal management driver for its desktop family of chipsets. Failed exploits may result in denial-of-service conditions. \nIntel Manageability Engine versions 8.x, 9.x, 10.x, 11.0,11.5, 11.6, 11.7, 11.10, and 11.20 are vulnerable. Intel Xeon Processor E3-1200 and others are CPUs (Central Processing Units) of Intel Corporation. Active Management Technology (AMT) is one of the active management components. The following products and firmware are affected: Intel Manageability Engine Firmware Version 8.x, Version 9.x, Version 10.x, Version 11.0, Version 11.5, Version 11.6, Version 11.7, Version 11.10, Version 11.20; Intel 6th, 7th and 8th Generation Intel Core Processor Family; Intel Xeon Processor E3-1200 v5 and v6 Product Family; Intel Xeon Processor Scalable Family; Intel Xeon Processor W Family; Intel Atom C3000 Processor Family; Apollo Lake Intel Atom Processor E3900 series; Apollo Lake Intel Pentium; Celeron N and J series Processors", "sources": [ { "db": "NVD", "id": "CVE-2017-5712" }, { "db": "JVNDB", "id": "JVNDB-2017-010525" }, { "db": "CNVD", "id": "CNVD-2017-37852" }, { "db": "BID", "id": "101920" }, { "db": "IVD", "id": "e2e06b61-39ab-11e9-9e0b-000c29342cb1" }, { "db": "VULHUB", "id": "VHN-113915" } ], "trust": 2.7 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-5712", "trust": 3.6 }, { "db": "BID", "id": "101920", "trust": 2.6 }, { "db": "SECTRACK", "id": "1039852", "trust": 1.7 }, { "db": "SIEMENS", "id": "SSA-892715", "trust": 1.7 }, { "db": "CNNVD", "id": "CNNVD-201711-880", "trust": 0.9 }, { "db": "CNVD", "id": "CNVD-2017-37852", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-18-060-01", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-010525", "trust": 0.8 }, { "db": "IVD", "id": "E2E06B61-39AB-11E9-9E0B-000C29342CB1", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-113915", "trust": 0.1 } ], "sources": [ { "db": "IVD", "id": "e2e06b61-39ab-11e9-9e0b-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2017-37852" }, { "db": "VULHUB", "id": "VHN-113915" }, { "db": "BID", "id": "101920" }, { "db": "JVNDB", "id": "JVNDB-2017-010525" }, { "db": "CNNVD", "id": "CNNVD-201711-880" }, { "db": "NVD", "id": "CVE-2017-5712" } ] }, "id": "VAR-201711-0651", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "e2e06b61-39ab-11e9-9e0b-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2017-37852" }, { "db": "VULHUB", "id": "VHN-113915" } ], "trust": 1.48846155 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "e2e06b61-39ab-11e9-9e0b-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2017-37852" } ] }, "last_update_date": "2024-11-23T21:53:34.178000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "INTEL-SA-00086", "trust": 0.8, "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "title": "NTAP-20171120-0001", "trust": 0.8, "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "title": "Patch for Intel Manageability Engine Buffer Overflow Vulnerability (CNVD-2017-37852)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/111453" }, { "title": "Multiple Intel product Intel Manageability Engine Firmware Buffer error vulnerability fix", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=76612" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-37852" }, { "db": "JVNDB", "id": "JVNDB-2017-010525" }, { "db": "CNNVD", "id": "CNNVD-201711-880" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-113915" }, { "db": "JVNDB", "id": "JVNDB-2017-010525" }, { "db": "NVD", "id": "CVE-2017-5712" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00086\u0026languageid=en-fr" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/101920" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "trust": 1.7, "url": "https://www.asus.com/news/wzeltg5cjyaiwgj0" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1039852" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-5712" }, { "trust": 0.8, "url": "https://www.us-cert.gov/ics/advisories/icsa-18-060-01" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-5712" }, { "trust": 0.3, "url": "http://www.intel.com/content/www/us/en/homepage.html" }, { "trust": 0.1, "url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00086\u0026amp;languageid=en-fr" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-37852" }, { "db": "VULHUB", "id": "VHN-113915" }, { "db": "BID", "id": "101920" }, { "db": "JVNDB", "id": "JVNDB-2017-010525" }, { "db": "CNNVD", "id": "CNNVD-201711-880" }, { "db": "NVD", "id": "CVE-2017-5712" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "e2e06b61-39ab-11e9-9e0b-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2017-37852" }, { "db": "VULHUB", "id": "VHN-113915" }, { "db": "BID", "id": "101920" }, { "db": "JVNDB", "id": "JVNDB-2017-010525" }, { "db": "CNNVD", "id": "CNNVD-201711-880" }, { "db": "NVD", "id": "CVE-2017-5712" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-12-22T00:00:00", "db": "IVD", "id": "e2e06b61-39ab-11e9-9e0b-000c29342cb1" }, { "date": "2017-12-22T00:00:00", "db": "CNVD", "id": "CNVD-2017-37852" }, { "date": "2017-11-21T00:00:00", "db": "VULHUB", "id": "VHN-113915" }, { "date": "2017-11-20T00:00:00", "db": "BID", "id": "101920" }, { "date": "2017-12-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-010525" }, { "date": "2017-11-24T00:00:00", "db": "CNNVD", "id": "CNNVD-201711-880" }, { "date": "2017-11-21T14:29:00.540000", "db": "NVD", "id": "CVE-2017-5712" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-12-22T00:00:00", "db": "CNVD", "id": "CNVD-2017-37852" }, { "date": "2018-05-11T00:00:00", "db": "VULHUB", "id": "VHN-113915" }, { "date": "2017-12-19T22:00:00", "db": "BID", "id": "101920" }, { "date": "2019-07-10T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-010525" }, { "date": "2023-05-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201711-880" }, { "date": "2024-11-21T03:28:16.610000", "db": "NVD", "id": "CVE-2017-5712" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201711-880" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Manageability Engine Firmware of Active Management Technology Buffer error vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-010525" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201711-880" } ], "trust": 0.6 } }
cve-2023-23588
Vulnerability from cvelistv5
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Siemens | SIMATIC IPC1047 |
Version: All versions |
||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:35:33.386Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-511182.pdf" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-23588", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-15T17:09:07.958283Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-15T17:12:13.841Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "SIMATIC IPC1047", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC IPC1047E", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions with maxView Storage Manager \u003c 4.09.00.25611 on Windows" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC IPC647D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC IPC647E", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions with maxView Storage Manager \u003c 4.09.00.25611 on Windows" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC IPC847D", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions" } ] }, { "defaultStatus": "unknown", "product": "SIMATIC IPC847E", "vendor": "Siemens", "versions": [ { "status": "affected", "version": "All versions with maxView Storage Manager \u003c 4.09.00.25611 on Windows" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in SIMATIC IPC1047 (All versions), SIMATIC IPC1047E (All versions with maxView Storage Manager \u003c 4.09.00.25611 on Windows), SIMATIC IPC647D (All versions), SIMATIC IPC647E (All versions with maxView Storage Manager \u003c 4.09.00.25611 on Windows), SIMATIC IPC847D (All versions), SIMATIC IPC847E (All versions with maxView Storage Manager \u003c 4.09.00.25611 on Windows). The Adaptec Maxview application on affected devices is using a non-unique TLS certificate across installations to protect the communication from the local browser to the local application.\r\nA local attacker may use this key to decrypt intercepted local traffic between the browser and the application and could perform a man-in-the-middle attack in order to modify data in transit." } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-11T09:03:01.130Z", "orgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "shortName": "siemens" }, "references": [ { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-511182.pdf" } ] } }, "cveMetadata": { "assignerOrgId": "cec7a2ec-15b4-4faf-bd53-b40f371f3a77", "assignerShortName": "siemens", "cveId": "CVE-2023-23588", "datePublished": "2023-04-11T09:03:01.130Z", "dateReserved": "2023-01-13T14:55:01.563Z", "dateUpdated": "2024-10-15T17:12:13.841Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }