Vulnerabilites related to intel - hns2600bpblc24
Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Stack overflow in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure and/or denial of service via network access.
Impacted products
Vendor Product Version
intel baseboard_management_controller_firmware *
intel bbs2600bpb -
intel bbs2600bpbr -
intel bbs2600bpq -
intel bbs2600bpqr -
intel bbs2600bps -
intel bbs2600bpsr -
intel bbs2600stb -
intel bbs2600stbr -
intel bbs2600stq -
intel bbs2600stqr -
intel hns2600bpb -
intel hns2600bpb24 -
intel hns2600bpb24r -
intel hns2600bpb24rx -
intel hns2600bpblc -
intel hns2600bpblc24 -
intel hns2600bpblc24r -
intel hns2600bpblcr -
intel hns2600bpbr -
intel hns2600bpbrx -
intel hns2600bpq -
intel hns2600bpq24 -
intel hns2600bpq24r -
intel hns2600bpqr -
intel hns2600bps -
intel hns2600bps24 -
intel hns2600bps24r -
intel hns2600bpsr -
intel hpchns2600bpbr -
intel hpchns2600bpqr -
intel hpchns2600bpsr -
intel hpcr1208wfqysr -
intel hpcr1208wftysr -
intel hpcr1304wf0ysr -
intel hpcr1304wftysr -
intel hpcr2208wf0zsr -
intel hpcr2208wfqzsr -
intel hpcr2208wftzsr -
intel hpcr2208wftzsrx -
intel hpcr2224wftzsr -
intel hpcr2308wftzsr -
intel hpcr2312wf0npr -
intel hpcr2312wftzsr -
intel r1208wfqysr -
intel r1208wftys -
intel r1208wftysr -
intel r1304wf0ys -
intel r1304wf0ysr -
intel r1304wftys -
intel r1304wftysr -
intel r2208wf0zs -
intel r2208wf0zsr -
intel r2208wfqzs -
intel r2208wfqzsr -
intel r2208wftzs -
intel r2208wftzsr -
intel r2208wftzsrx -
intel r2224wfqzs -
intel r2224wftzs -
intel r2224wftzsr -
intel r2308wftzs -
intel r2308wftzsr -
intel r2312wf0np -
intel r2312wf0npr -
intel r2312wfqzs -
intel r2312wftzs -
intel r2312wftzsr -
intel s2600stb -
intel s2600stbr -
intel s2600stq -
intel s2600stqr -
intel s2600wf0 -
intel s2600wf0r -
intel s2600wfq -
intel s2600wfqr -
intel s2600wft -
intel s2600wftr -
intel s9232wk1hlc -
intel s9232wk2hac -
intel s9232wk2hlc -
intel s9248wk1hlc -
intel s9248wk2hac -
intel s9248wk2hlc -
intel s9256wk1hlc -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22885F1F-00C7-423B-8B11-A9DB70EE6677",
              "versionEndExcluding": "2.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B49A0E57-126A-4C60-A748-5D357E7B4670",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BB3CD5-DF01-40A8-9906-5C5B306C1B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "263AF100-E101-4FEC-8CB3-8FFDB22B5E27",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3CC4D7-1756-44DB-814D-57106E6826C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECDD9533-1592-465E-B2B3-DB6077782D10",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7819ABC6-800C-4141-A31F-14CBE788EF62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC60590-8707-4B7D-A1D8-188D53F38016",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "106C758A-F23A-48B3-8360-A10212AF50E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F0759F-4583-43CF-AE0B-584A4DDAC633",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E77D-DDB7-41AB-8728-9782336C167B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AAEC7C-3538-4041-A644-515B142F6E8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0431FDBE-4A58-40B1-B635-225E5B9EDBBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86739A74-AE8B-4699-8C1B-AC5D30C4FA50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD891C11-B432-4B87-96BE-7C8BFA76E801",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABE36A4-3F68-4077-A619-743AB1FB92AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E521A2A-B231-4D00-AA1A-92B228B99E4A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1A7612-E617-43DE-826E-DDD7F968CDC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75737EC4-8161-4F09-AD90-7C7E25ACBCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83471545-E7E5-44E7-9967-2F2D808AA866",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FF75DFA-62D9-4CFE-A503-F07A56573CEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F954A5AA-AD4D-4754-8087-DF6ED312DCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50201278-AD47-468E-BA70-900399F2F758",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B062F88-6088-42AF-9B47-ACDEB88A4390",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF6884DD-0C0F-453B-A826-6360C95BD10F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA9657DC-AA1C-4B47-9286-3D7D73F9A714",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "495BFD25-08D3-4DDE-A640-5E7D85AB0560",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C74211C3-3F9D-41E8-AB5B-16205AD90B64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC998F55-2B5C-418D-9B17-23A05C75F454",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C622C8-95E1-4A7F-B3E1-4199310CF4E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D96863-E459-4C0E-B0C8-5207FC3E7962",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F92047-1D58-47E6-89AC-D4434230DB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F422B74A-AF81-4D17-AFEC-E228C5B2023E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3A107D2-6521-4C91-A35D-6E92A5A15A47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9DDFA5-349D-4451-95B1-35ACD8F1D354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B11D98E4-73ED-45D7-A224-E734283585EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "605AD870-F4F5-4159-89BE-9B29D58C04C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack overflow in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure and/or denial of service via network access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento de pila en el firmware de Intel\u00ae Baseboard Management Controller, puede habilitar a un usuario autenticado para permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n y/o una denegaci\u00f3n de servicio por medio de un acceso a la red."
    }
  ],
  "id": "CVE-2019-11178",
  "lastModified": "2024-11-21T04:20:40.390",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-14T17:15:14.210",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-02-17 14:15
Modified
2024-11-21 04:59
Summary
Out of bounds read in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow an authenticated user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:bmc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "15CF9AD6-8F14-40FC-8657-8BC57B595ED2",
              "versionEndExcluding": "2.47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E77D-DDB7-41AB-8728-9782336C167B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0431FDBE-4A58-40B1-B635-225E5B9EDBBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86739A74-AE8B-4699-8C1B-AC5D30C4FA50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD891C11-B432-4B87-96BE-7C8BFA76E801",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1000wf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5E07CC-3948-4664-AE8E-0517D9D66211",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68606D69-C913-492A-A00E-3D899AB42595",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D292D7D-1E22-440F-B30C-3C580AFE91C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89B4E6B-B742-4BCA-9547-B1C6059C6671",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out of bounds read in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Una lectura fuera de l\u00edmites del firmware BMC para algunos Intel\u00ae Server Boards, Server Systems and Compute Modules versiones anteriores a 2.47, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-12380",
  "lastModified": "2024-11-21T04:59:36.710",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-02-17T14:15:15.937",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-02-17 14:15
Modified
2024-11-21 04:59
Summary
Heap overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow an authenticated user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:bmc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "15CF9AD6-8F14-40FC-8657-8BC57B595ED2",
              "versionEndExcluding": "2.47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E77D-DDB7-41AB-8728-9782336C167B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0431FDBE-4A58-40B1-B635-225E5B9EDBBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86739A74-AE8B-4699-8C1B-AC5D30C4FA50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD891C11-B432-4B87-96BE-7C8BFA76E801",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1000wf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5E07CC-3948-4664-AE8E-0517D9D66211",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68606D69-C913-492A-A00E-3D899AB42595",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D292D7D-1E22-440F-B30C-3C580AFE91C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89B4E6B-B742-4BCA-9547-B1C6059C6671",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento de pila en el firmware BMC para algunos Intel\u00ae Server Boards, Server Systems and Compute Modules versiones anteriores a 2.47, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-12375",
  "lastModified": "2024-11-21T04:59:36.343",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-02-17T14:15:15.747",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-05-17 16:29
Modified
2024-11-21 04:16
Summary
Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access.
Impacted products
Vendor Product Version
intel xeon_d-1649n_firmware -
intel xeon_d-1649n -
intel xeon_d-1633n_firmware -
intel xeon_d-1633n -
intel xeon_d-1637_firmware -
intel xeon_d-1637 -
intel xeon_d-1627_firmware -
intel xeon_d-1627 -
intel xeon_d-1623n_firmware -
intel xeon_d-1623n -
intel xeon_d-1622_firmware -
intel xeon_d-1622 -
intel xeon_d-1653n_firmware -
intel xeon_d-1653n -
intel xeon_d-1602_firmware -
intel xeon_d-1602 -
intel xeon_d-2141i_firmware -
intel xeon_d-2141i -
intel xeon_d-2177nt_firmware -
intel xeon_d-2177nt -
intel xeon_d-2161i_firmware -
intel xeon_d-2161i -
intel xeon_d-2143it_firmware -
intel xeon_d-2143it -
intel xeon_d-2146nt_firmware -
intel xeon_d-2146nt -
intel xeon_d-2145nt_firmware -
intel xeon_d-2145nt -
intel xeon_d-2123it_firmware -
intel xeon_d-2123it -
intel xeon_d-2173it_firmware -
intel xeon_d-2173it -
intel xeon_d-2191_firmware -
intel xeon_d-2191 -
intel xeon_d-2187nt_firmware -
intel xeon_d-2187nt -
intel xeon_d-2142it_firmware -
intel xeon_d-2142it -
intel xeon_d-2163it_firmware -
intel xeon_d-2163it -
intel xeon_d-2183it_firmware -
intel xeon_d-2183it -
intel xeon_d-2166nt_firmware -
intel xeon_d-2166nt -
intel xeon_d-1513n_firmware -
intel xeon_d-1513n -
intel xeon_d-1533n_firmware -
intel xeon_d-1533n -
intel xeon_d-1553n_firmware -
intel xeon_d-1553n -
intel xeon_d-1523n_firmware -
intel xeon_d-1523n -
intel xeon_d-1543n_firmware -
intel xeon_d-1543n -
intel xeon_d-1559_firmware -
intel xeon_d-1559 -
intel xeon_d-1529_firmware -
intel xeon_d-1529 -
intel xeon_d-1539_firmware -
intel xeon_d-1539 -
intel xeon_d-1567_firmware -
intel xeon_d-1567 -
intel xeon_d-1557_firmware -
intel xeon_d-1557 -
intel xeon_d-1577_firmware -
intel xeon_d-1577 -
intel xeon_d-1571_firmware -
intel xeon_d-1571 -
intel xeon_d-1528_firmware -
intel xeon_d-1528 -
intel xeon_d-1541_firmware -
intel xeon_d-1541 -
intel xeon_d-1518_firmware -
intel xeon_d-1518 -
intel xeon_d-1521_firmware -
intel xeon_d-1521 -
intel xeon_d-1531_firmware -
intel xeon_d-1531 -
intel xeon_d-1548_firmware -
intel xeon_d-1548 -
intel xeon_d-1527_firmware -
intel xeon_d-1527 -
intel xeon_d-1537_firmware -
intel xeon_d-1537 -
intel xeon_d-1540_firmware -
intel xeon_d-1540 -
intel xeon_d-1520_firmware -
intel xeon_d-1520 -
intel xeon_platinum_processors_firmware -
intel xeon_platinum_processors -
intel xeon_gold_processors_firmware -
intel xeon_gold_processors -
intel xeon_silver_processors_firmware -
intel xeon_silver_processors -
intel xeon_bronze_processors_firmware -
intel xeon_bronze_processors -
intel server_board_s2600wf_firmware -
intel server_board_s2600wf -
intel server_board_s2600bp_firmware -
intel server_board_s2600bp -
intel server_board_s2600st_firmware -
intel server_board_s2600st -
intel server_board_s2600wt_firmware -
intel server_board_s2600wt -
intel server_board_s2600kp_firmware -
intel server_board_s2600kp -
intel server_board_s2600tp_firmware -
intel server_board_s2600tp -
intel server_board_s2600cw_firmware -
intel server_board_s2600cw -
intel server_board_s7200ap_firmware -
intel server_board_s7200ap -
intel server_board_s1200sp_firmware -
intel server_board_s1200sp -
intel server_system_s9200wk_firmware -
intel server_system_s9200wk -
intel hns2600bpq24_firmware -
intel hns2600bpq24 -
intel hns2600bps_firmware -
intel hns2600bps -
intel hns2600bps24_firmware -
intel hns2600bps24 -
intel hns7200ap_firmware -
intel hns7200ap -
intel hns7200apl_firmware -
intel hns7200apl -
intel hns7200apr_firmware -
intel hns7200apr -
intel hns7200aprl_firmware -
intel hns7200aprl -
intel hns2600tp_firmware -
intel hns2600tp -
intel hns2600tp24r_firmware -
intel hns2600tp24r -
intel hns2600tp24sr_firmware -
intel hns2600tp24sr -
intel hns2600tp24str_firmware -
intel hns2600tp24str -
intel hns2600tpf_firmware -
intel hns2600tpf -
intel hns2600tpfr_firmware -
intel hns2600tpfr -
intel hns2600tpnr_firmware -
intel hns2600tpnr -
intel hns2600tpr_firmware -
intel hns2600tpr -
intel hns2600kp_firmware -
intel hns2600kp -
intel hns2600kpf_firmware -
intel hns2600kpf -
intel hns2600kpfr_firmware -
intel hns2600kpfr -
intel hns2600kpr_firmware -
intel hns2600kpr -
intel hns2600bpb24_firmware -
intel hns2600bpb24 -
intel hns2600bpb_firmware -
intel hns2600bpb -
intel hns2600bpblc_firmware -
intel hns2600bpblc -
intel hns2600bpblc24_firmware -
intel hns2600bpblc24 -
intel hns2600bpq_firmware -
intel hns2600bpq -
intel hns2400lp_firmware -
intel hns2400lp -
intel hns2600jf_firmware -
intel hns2600jf -
intel hns2600jff_firmware -
intel hns2600jff -
intel hns2600jfq_firmware -
intel hns2600jfq -
intel hns2600wp_firmware -
intel hns2600wp -
intel hns2600wpf_firmware -
intel hns2600wpf -
intel hns2600wpq_firmware -
intel hns2600wpq -
intel mfs2600ki_firmware -
intel mfs2600ki -
intel mfs5000si_firmware -
intel mfs5000si -
intel mfs5520vir_firmware -
intel mfs5520vir -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37012AFD-094E-4742-972F-AEEDDEE4105C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38161238-5D40-485F-B0D2-D7621EC317D6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FAC3989-A0CA-465A-9DB9-3C29D617C8AE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84B97F2B-A3D1-48A3-9FB7-755191FDD720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B94CF0F-0A7B-42D1-90AF-28A893DA85D2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "10FD9FEF-2186-4416-93B7-B743657412A1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0D72C6B-6F57-4D37-9363-E741E2931B8D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97E8DD28-EC33-489F-A71C-2AEACFB16FC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A0297E3-3D66-4174-97EE-832F5E1DC708",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "543DB437-425F-4FF7-BDBD-FB5CC17E0056",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A905368-740B-48FB-8949-D212D637E5E5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41FC8B26-7611-45B6-A37D-DF7025E2E92D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "394270FA-3A62-4778-9E38-70CF88B430DD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BE4E4AC-4E1D-4F86-A8E8-8053EE1B974E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "786C8BA5-A74D-46FD-8241-12934B6C26B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F4B6C48-261B-4B0E-BA2A-7E3060D01F93",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81D4C607-D5EA-43C3-AE74-301BF0BA929F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FB59E56-9FBE-4D10-AFC0-03E0ED0A4120",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8B39E8-26E8-4ACE-88D6-0AAF4E2515C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3757F7B-4283-4ABF-974B-59E4E2358035",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B1F65EA-5A27-4700-98F1-B82DAAB3CCF4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0327393-DB2A-455B-8E20-3EDB3766CDA6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A06D956-804A-47DE-85D2-26BEE9B3E313",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B10FCF1-F496-4166-9162-41012C4D2B16",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35DE5D2A-7DCF-4398-8514-9BB88DC81B77",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCADFB25-DCBB-4901-9E4D-132ED49C7F26",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "440D381D-D093-474C-8D22-AD610DEAB775",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACAAD0F0-9182-46EF-8399-C04FB472BE6F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA657873-A9B1-4513-8C60-29FAEC1E22F2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B804174C-53DB-4641-BD26-3ECDD9FBD638",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93409D2B-67E1-4410-9013-28E80B2525C1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4925D0EA-D524-432F-8417-892BB8C3DDFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9976EF5C-1AFA-4FED-8248-B6638D75743A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14DFFCEF-09F5-4228-AB7F-F042C4D5CE2A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "811D3C20-42DC-4EAA-8B3F-A9B52CA79DF1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "122BD094-E815-4081-B674-B71AC193BE0F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2DF49A2-ED2E-44C3-8F0A-65E94807A4F5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3930A6D-64DC-4953-AD7E-EED0C48B048E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61643FC4-4D2C-42A8-ADDB-1866A6F638DF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2E00698-8A08-433F-8852-8EDC422A53D8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBE8D02A-E569-499C-8EEB-273FE003364E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "93D86199-5CF3-4E7A-8295-50F958EA4B4C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "505E8798-0795-48A9-A55F-88CFF761843D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A25BD7C-F01B-49F6-8DB0-2F8B976AC9E4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A869936B-3C49-4E13-A467-28CBA4178F40",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "404409CA-326B-425D-A4E5-1A3C8CC45344",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E45CD9C5-73E5-4D79-8E7C-D1A6FEA2EA9D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74F2A5C9-C593-4C42-A47E-F563C4696137",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FBCEF54-FC1D-4AE6-BD29-D7EE7F401180",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A84814F-B070-45B0-ABC2-1BAAA212EFD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "712B36F5-6217-48BE-BA59-55F4AD9EACDB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D99D4F6F-5874-4F5D-91FD-E265DCE86667",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2577C819-3541-4AF5-87C1-C5ABA32AA709",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC6E2595-D9E7-46D6-99C8-336DEB1B4020",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ECFE5B6-CD41-4DA1-BA61-2ED51BFE7F6A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B897D23E-1BC1-4FBB-AD00-422413C1749C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5872F0A-E0E2-419A-91B4-7A57268CCB25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD387ADD-02CA-4154-BF86-0DBE664FE5F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C57B1AE-7C36-4991-9835-8BA292598B51",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDA12CAD-F622-4F14-8847-AFD8DC250B40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF024983-AAB6-4A1B-BB04-DA015D59F9DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C50FBC-6933-4E98-82B9-A70B1C836ED8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB5F33C5-18B0-43B4-A478-DB0478019E6D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9BD8917-5BEA-491C-B6E8-486FF957A876",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "540F4FFD-174C-4183-B208-9F7BA81E10A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "971C6442-6546-440B-AD74-44A5BB527D11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BF2C02E-7C0D-4FB8-9D74-7CD9FAD32D2B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F8AD4D2-D48B-4F53-A0BA-A90E5A970832",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC4D8719-A1B6-4641-9116-B3530AE77DEA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FA0A03C-21BB-4C5D-85B3-FF579F34E82C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A3B14F2-3FE9-4435-A463-55C0DDF867B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCCDD79D-80C4-4A52-94F6-F30237AE0C53",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F54775F7-3AFF-4675-A686-A2EC357FEB85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA5E65D0-6DB9-41D2-9721-8F1232D8155F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF812F0E-DC8B-404D-ACE3-EA55FA189615",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4BAE58B-C0D2-466A-88C1-47D2A81E9D7A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE2F3B48-F432-473C-B7AA-881350F4ABC4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAB6FBF0-14B5-4DDC-BEC2-16535679B0C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "243FB5C6-FA42-4148-AA32-8DA43D2A1669",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "829702E9-C0EB-4E4B-A979-41A2235B182B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "63259ADB-12AC-43B8-8399-0AD7A4CCF31C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47DB082B-E169-4BE0-81DC-B2A7219C4DA3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "104244E0-C4D7-46A7-999C-07180274E8D8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA7576BD-43FE-44D2-A665-F78BDA4D964D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B2DE391-0FFA-4F9E-8349-6E41267F74C1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA062554-DBBC-4215-9705-1ADA545B5887",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A442CBEF-77FC-4D2C-99D7-EE8FA558D1AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46066C5B-DB48-4B83-9E5E-3809D3F7FED2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_platinum_processors_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F3637AA-39EF-4E25-B261-B459BA1BD21F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_platinum_processors:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "355AB900-FB37-4D5E-92A2-3E086D6A85C0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_gold_processors_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "085EA00B-AAC4-4798-96B9-043B0FDB86DE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_gold_processors:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F2B05AE-3B12-42C7-B481-737ADEBF8141",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_silver_processors_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAA7DD0B-30EC-4209-8FB0-778E6A7FE8C5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_silver_processors:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDB67C17-BB77-410C-94DB-64C89B5902AF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:xeon_bronze_processors_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "498B276C-BDD1-4DFC-BF91-EAC7AFBB7749",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:xeon_bronze_processors:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D2D523-8E4D-4040-8C3D-7B0A26B44BBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48A8D62A-C24D-4BEF-9A18-31302CB8AC5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27A7EB6D-0BFC-4867-B50D-C1EA408454FC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC990FC5-F28F-415A-9433-8BCC9CD91E3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BA2B3A6-7582-437C-A7B5-D281A4B15F15",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14E349D5-6DF5-49CF-AE48-284054D2CB1B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600st:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "299A5554-98F1-412D-9E33-8FA8B483390E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21897C71-471E-462C-9D1B-C49C621A4B6F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D3CEDD3-E0A4-4935-BF07-D66B49BAC266",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21BBAE45-9DEA-4DEC-A60A-0C4E77914674",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600tp_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3474791-C2B4-4064-83B4-B7699CA38F1C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94C439DB-B460-4BB5-B621-AE7421B0B06C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600cw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B19A63D-5CE0-40B0-9D07-82BF454C8A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s7200ap_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B1139D6-EDC2-424B-A173-2DD449450667",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s7200ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0839B6A4-6540-4473-844A-E87686FD3A63",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "260E1D49-962E-49E9-AFAE-459341CA8126",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB88A242-B342-490F-81BA-B72EE4F55393",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_s9200wk_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9E8A866-7AA8-47DD-8A01-2BF448527441",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_s9200wk:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46810508-FE12-40A5-A7C1-C1AF6BD7EA0C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600bpq24_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B83845D5-A374-40B9-9550-09124AD1BE05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600bps_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72EA4F6C-2BC0-43DE-A59F-E4004B28B146",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600bps24_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "654B9B0B-6084-4450-9648-9F7FBEDD2C91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns7200ap_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "940EB39B-E8DB-4323-8301-505E9D826478",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns7200ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE3E826A-6B5B-4445-9D09-0D3C65276259",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns7200apl_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC46E52C-72D2-4312-8158-643D2AEEFB0E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns7200apl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F95ADEA-F861-45B2-AE47-390C311FC97F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns7200apr_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C80F2233-D9C2-448E-9010-B37FBBB2A996",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns7200apr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "254CB73B-6A91-408F-A3C9-D3259BC2EF9F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns7200aprl_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FD70241-2D9E-4DFB-A3DF-56D405BB69EF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns7200aprl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BCA0A87-6776-4711-8692-03C0DFD01779",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600tp_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C762F09B-7D26-4582-9B9D-BB8DDBD5D2E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3BA09F-2DE7-4C1C-8FBC-7D96BAD51C22",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600tp24r_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5088035D-783F-4F95-BD83-4AF994711FCA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12F99059-4FE6-49AB-AA9D-4890C2D747FC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600tp24sr_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0C899AE-396B-4BB7-A0B9-9338D3DE4DD6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD725F8F-76BC-4A20-A02D-0A68B67CA401",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600tp24str_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79C6F4D7-0D87-4437-B7CE-8911A4DA6909",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600tp24str:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "635E397E-BB32-4C2F-A19F-7C1219A726D3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600tpf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8949DC7F-5AD7-4039-A051-4D3C901EBC47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "238D8810-8055-44C3-AEAB-654458B95200",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600tpfr_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31D4D2FC-D5AD-4D6D-A101-A0B97815D6FD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6507AB9B-5925-4F6C-9641-9806A226B3CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600tpnr_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98983C21-3374-4A25-911B-27EE7AFA63C8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600tpnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F01C4D33-AED6-427D-8631-E4763410C93F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600tpr_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D384DA-DBB5-43BC-960A-4C5F8B668BAF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B69B157-19C4-4CF4-8762-97030DD01A15",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600kp_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1561B3E8-3D8D-42EA-9A5E-9FC0E1FFD166",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BB5E8B4-0DBA-4061-B825-4EC6B0B2FB28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600kpf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20E38F13-D9E2-4F20-AEDF-E452D1245A31",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "667BF70D-C6B0-4B22-9818-8EC5C29FF6A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600kpfr_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EFFA913-C14D-4411-A36C-A458FAA992C9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4561DCAF-5A12-4A35-93A0-8F097D22F275",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600kpr_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "228ADBA6-A0CA-434A-A9DB-E97DD9A4CEAC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2A50B12-5F1A-4F42-807A-EE73668C9690",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600bpb24_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3229FA51-F6DE-412E-BE9D-5DEC5D479F95",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600bpb_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C54DC1E7-58AE-4180-8E04-DC45956CE1D8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600bpblc_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "451329D5-288D-4180-A59E-07814C92AA3B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600bpblc24_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23857DA1-CE23-4A30-9D88-CAA0C30DABBB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600bpq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0890BF09-F8C5-4A54-B87F-26C26580ADE0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2400lp_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D537A6E-30CB-479A-8108-24C8F860BF6E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2400lp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91551FD2-EE22-4259-82F2-16FD1154A46F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600jf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17A13F9E-71DC-45FC-8392-DE73BDFDC704",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600jf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1022FD90-8E4A-45E0-B8C1-7BB01A4A88D7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600jff_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DE1E75B-ACC9-4FC1-909B-45AEA04187AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600jff:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69092B45-C7D4-48B9-A428-C5A2C91692F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600jfq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EAB2E13-EE0F-45D6-A1C9-EFA5ED915B97",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600jfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A218911B-F504-426B-9620-73FAC32D3FBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600wp_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85584018-2CAE-448C-8D30-5D04D27FFBD6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600wp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9429C96D-EC72-441E-AEB7-12EBEE47B519",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600wpf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87E69515-C31C-4CF0-980B-30E981461EA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600wpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F65EAB8-E07A-4DDD-B1D7-76406C2B80A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:hns2600wpq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8D0A9-BA64-4615-A99F-D4C55E9DDDF4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600wpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "272DC039-1926-4737-8661-EA1F7080ECAA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:mfs2600ki_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AF8B579-BC74-4EE1-AEF6-5DA026B9A2E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:mfs2600ki:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15BACE83-D85C-4EC8-9C31-74AF01137C44",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:mfs5000si_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A890127D-E8DD-40C8-9785-115BC3C43D1A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:mfs5000si:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4857C68-1705-412D-B48E-2731A5C60C52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:mfs5520vir_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41D972A4-A22E-4D22-B95D-A3A06114DA7B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:mfs5520vir:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50E45B16-9F61-4427-A450-BC0733EC8A22",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de desbordamiento de b\u00fafer en el firmware del sistema para Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module, puede permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios y/o Denegaci\u00f3n de Servicio (DoS) por medio del acceso local."
    }
  ],
  "id": "CVE-2019-0119",
  "lastModified": "2024-11-21T04:16:16.060",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-05-17T16:29:01.783",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "http://www.securityfocus.com/bid/108485"
    },
    {
      "source": "secure@intel.com",
      "url": "https://support.f5.com/csp/article/K85585101"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/108485"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.f5.com/csp/article/K85585101"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-02-17 14:15
Modified
2024-11-21 04:59
Summary
Expired pointer dereference in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable a denial of service via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:bmc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "15CF9AD6-8F14-40FC-8657-8BC57B595ED2",
              "versionEndExcluding": "2.47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E77D-DDB7-41AB-8728-9782336C167B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0431FDBE-4A58-40B1-B635-225E5B9EDBBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86739A74-AE8B-4699-8C1B-AC5D30C4FA50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD891C11-B432-4B87-96BE-7C8BFA76E801",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1000wf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5E07CC-3948-4664-AE8E-0517D9D66211",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68606D69-C913-492A-A00E-3D899AB42595",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D292D7D-1E22-440F-B30C-3C580AFE91C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89B4E6B-B742-4BCA-9547-B1C6059C6671",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Expired pointer dereference in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable a denial of service via local access."
    },
    {
      "lang": "es",
      "value": "La derivaci\u00f3n de punteros caducados en algunos controladores gr\u00e1ficos de Intel(R) anteriores a la versi\u00f3n 26.20.100.8141 puede permitir a un usuario con privilegios habilitar potencialmente una denegaci\u00f3n de servicio mediante acceso local."
    }
  ],
  "id": "CVE-2020-12373",
  "lastModified": "2024-11-21T04:59:36.083",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-02-17T14:15:15.700",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Severity ?
Summary
Heap corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via network access.
Impacted products
Vendor Product Version
intel baseboard_management_controller_firmware *
intel bbs2600bpb -
intel bbs2600bpbr -
intel bbs2600bpq -
intel bbs2600bpqr -
intel bbs2600bps -
intel bbs2600bpsr -
intel bbs2600stb -
intel bbs2600stbr -
intel bbs2600stq -
intel bbs2600stqr -
intel hns2600bpb -
intel hns2600bpb24 -
intel hns2600bpb24r -
intel hns2600bpb24rx -
intel hns2600bpblc -
intel hns2600bpblc24 -
intel hns2600bpblc24r -
intel hns2600bpblcr -
intel hns2600bpbr -
intel hns2600bpbrx -
intel hns2600bpq -
intel hns2600bpq24 -
intel hns2600bpq24r -
intel hns2600bpqr -
intel hns2600bps -
intel hns2600bps24 -
intel hns2600bps24r -
intel hns2600bpsr -
intel hpchns2600bpbr -
intel hpchns2600bpqr -
intel hpchns2600bpsr -
intel hpcr1208wfqysr -
intel hpcr1208wftysr -
intel hpcr1304wf0ysr -
intel hpcr1304wftysr -
intel hpcr2208wf0zsr -
intel hpcr2208wfqzsr -
intel hpcr2208wftzsr -
intel hpcr2208wftzsrx -
intel hpcr2224wftzsr -
intel hpcr2308wftzsr -
intel hpcr2312wf0npr -
intel hpcr2312wftzsr -
intel r1208wfqysr -
intel r1208wftys -
intel r1208wftysr -
intel r1304wf0ys -
intel r1304wf0ysr -
intel r1304wftys -
intel r1304wftysr -
intel r2208wf0zs -
intel r2208wf0zsr -
intel r2208wfqzs -
intel r2208wfqzsr -
intel r2208wftzs -
intel r2208wftzsr -
intel r2208wftzsrx -
intel r2224wfqzs -
intel r2224wftzs -
intel r2224wftzsr -
intel r2308wftzs -
intel r2308wftzsr -
intel r2312wf0np -
intel r2312wf0npr -
intel r2312wfqzs -
intel r2312wftzs -
intel r2312wftzsr -
intel s2600stb -
intel s2600stbr -
intel s2600stq -
intel s2600stqr -
intel s2600wf0 -
intel s2600wf0r -
intel s2600wfq -
intel s2600wfqr -
intel s2600wft -
intel s2600wftr -
intel s9232wk1hlc -
intel s9232wk2hac -
intel s9232wk2hlc -
intel s9248wk1hlc -
intel s9248wk2hac -
intel s9248wk2hlc -
intel s9256wk1hlc -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22885F1F-00C7-423B-8B11-A9DB70EE6677",
              "versionEndExcluding": "2.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B49A0E57-126A-4C60-A748-5D357E7B4670",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BB3CD5-DF01-40A8-9906-5C5B306C1B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "263AF100-E101-4FEC-8CB3-8FFDB22B5E27",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3CC4D7-1756-44DB-814D-57106E6826C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECDD9533-1592-465E-B2B3-DB6077782D10",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7819ABC6-800C-4141-A31F-14CBE788EF62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC60590-8707-4B7D-A1D8-188D53F38016",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "106C758A-F23A-48B3-8360-A10212AF50E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F0759F-4583-43CF-AE0B-584A4DDAC633",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E77D-DDB7-41AB-8728-9782336C167B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AAEC7C-3538-4041-A644-515B142F6E8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0431FDBE-4A58-40B1-B635-225E5B9EDBBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86739A74-AE8B-4699-8C1B-AC5D30C4FA50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD891C11-B432-4B87-96BE-7C8BFA76E801",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABE36A4-3F68-4077-A619-743AB1FB92AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E521A2A-B231-4D00-AA1A-92B228B99E4A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1A7612-E617-43DE-826E-DDD7F968CDC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75737EC4-8161-4F09-AD90-7C7E25ACBCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83471545-E7E5-44E7-9967-2F2D808AA866",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FF75DFA-62D9-4CFE-A503-F07A56573CEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F954A5AA-AD4D-4754-8087-DF6ED312DCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50201278-AD47-468E-BA70-900399F2F758",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B062F88-6088-42AF-9B47-ACDEB88A4390",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF6884DD-0C0F-453B-A826-6360C95BD10F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA9657DC-AA1C-4B47-9286-3D7D73F9A714",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "495BFD25-08D3-4DDE-A640-5E7D85AB0560",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C74211C3-3F9D-41E8-AB5B-16205AD90B64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC998F55-2B5C-418D-9B17-23A05C75F454",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C622C8-95E1-4A7F-B3E1-4199310CF4E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D96863-E459-4C0E-B0C8-5207FC3E7962",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F92047-1D58-47E6-89AC-D4434230DB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F422B74A-AF81-4D17-AFEC-E228C5B2023E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3A107D2-6521-4C91-A35D-6E92A5A15A47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9DDFA5-349D-4451-95B1-35ACD8F1D354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B11D98E4-73ED-45D7-A224-E734283585EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "605AD870-F4F5-4159-89BE-9B29D58C04C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via network access."
    },
    {
      "lang": "es",
      "value": "Una corrupci\u00f3n de la pila en el firmware de Intel\u00ae Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n, una escalada de privilegios y/o una denegaci\u00f3n de servicio por medio de un acceso a la red."
    }
  ],
  "id": "CVE-2019-11171",
  "lastModified": "2024-11-21T04:20:39.653",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-14T17:15:13.817",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Memory corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.
Impacted products
Vendor Product Version
intel baseboard_management_controller_firmware *
intel bbs2600bpb -
intel bbs2600bpbr -
intel bbs2600bpq -
intel bbs2600bpqr -
intel bbs2600bps -
intel bbs2600bpsr -
intel bbs2600stb -
intel bbs2600stbr -
intel bbs2600stq -
intel bbs2600stqr -
intel hns2600bpb -
intel hns2600bpb24 -
intel hns2600bpb24r -
intel hns2600bpb24rx -
intel hns2600bpblc -
intel hns2600bpblc24 -
intel hns2600bpblc24r -
intel hns2600bpblcr -
intel hns2600bpbr -
intel hns2600bpbrx -
intel hns2600bpq -
intel hns2600bpq24 -
intel hns2600bpq24r -
intel hns2600bpqr -
intel hns2600bps -
intel hns2600bps24 -
intel hns2600bps24r -
intel hns2600bpsr -
intel hpchns2600bpbr -
intel hpchns2600bpqr -
intel hpchns2600bpsr -
intel hpcr1208wfqysr -
intel hpcr1208wftysr -
intel hpcr1304wf0ysr -
intel hpcr1304wftysr -
intel hpcr2208wf0zsr -
intel hpcr2208wfqzsr -
intel hpcr2208wftzsr -
intel hpcr2208wftzsrx -
intel hpcr2224wftzsr -
intel hpcr2308wftzsr -
intel hpcr2312wf0npr -
intel hpcr2312wftzsr -
intel r1208wfqysr -
intel r1208wftys -
intel r1208wftysr -
intel r1304wf0ys -
intel r1304wf0ysr -
intel r1304wftys -
intel r1304wftysr -
intel r2208wf0zs -
intel r2208wf0zsr -
intel r2208wfqzs -
intel r2208wfqzsr -
intel r2208wftzs -
intel r2208wftzsr -
intel r2208wftzsrx -
intel r2224wfqzs -
intel r2224wftzs -
intel r2224wftzsr -
intel r2308wftzs -
intel r2308wftzsr -
intel r2312wf0np -
intel r2312wf0npr -
intel r2312wfqzs -
intel r2312wftzs -
intel r2312wftzsr -
intel s2600stb -
intel s2600stbr -
intel s2600stq -
intel s2600stqr -
intel s2600wf0 -
intel s2600wf0r -
intel s2600wfq -
intel s2600wfqr -
intel s2600wft -
intel s2600wftr -
intel s9232wk1hlc -
intel s9232wk2hac -
intel s9232wk2hlc -
intel s9248wk1hlc -
intel s9248wk2hac -
intel s9248wk2hlc -
intel s9256wk1hlc -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22885F1F-00C7-423B-8B11-A9DB70EE6677",
              "versionEndExcluding": "2.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B49A0E57-126A-4C60-A748-5D357E7B4670",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BB3CD5-DF01-40A8-9906-5C5B306C1B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "263AF100-E101-4FEC-8CB3-8FFDB22B5E27",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3CC4D7-1756-44DB-814D-57106E6826C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECDD9533-1592-465E-B2B3-DB6077782D10",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7819ABC6-800C-4141-A31F-14CBE788EF62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC60590-8707-4B7D-A1D8-188D53F38016",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "106C758A-F23A-48B3-8360-A10212AF50E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F0759F-4583-43CF-AE0B-584A4DDAC633",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E77D-DDB7-41AB-8728-9782336C167B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AAEC7C-3538-4041-A644-515B142F6E8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0431FDBE-4A58-40B1-B635-225E5B9EDBBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86739A74-AE8B-4699-8C1B-AC5D30C4FA50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD891C11-B432-4B87-96BE-7C8BFA76E801",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABE36A4-3F68-4077-A619-743AB1FB92AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E521A2A-B231-4D00-AA1A-92B228B99E4A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1A7612-E617-43DE-826E-DDD7F968CDC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75737EC4-8161-4F09-AD90-7C7E25ACBCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83471545-E7E5-44E7-9967-2F2D808AA866",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FF75DFA-62D9-4CFE-A503-F07A56573CEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F954A5AA-AD4D-4754-8087-DF6ED312DCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50201278-AD47-468E-BA70-900399F2F758",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B062F88-6088-42AF-9B47-ACDEB88A4390",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF6884DD-0C0F-453B-A826-6360C95BD10F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA9657DC-AA1C-4B47-9286-3D7D73F9A714",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "495BFD25-08D3-4DDE-A640-5E7D85AB0560",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C74211C3-3F9D-41E8-AB5B-16205AD90B64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC998F55-2B5C-418D-9B17-23A05C75F454",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C622C8-95E1-4A7F-B3E1-4199310CF4E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D96863-E459-4C0E-B0C8-5207FC3E7962",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F92047-1D58-47E6-89AC-D4434230DB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F422B74A-AF81-4D17-AFEC-E228C5B2023E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3A107D2-6521-4C91-A35D-6E92A5A15A47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9DDFA5-349D-4451-95B1-35ACD8F1D354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B11D98E4-73ED-45D7-A224-E734283585EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "605AD870-F4F5-4159-89BE-9B29D58C04C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Memory corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access."
    },
    {
      "lang": "es",
      "value": "Una corrupci\u00f3n de la memoria en el firmware de Intel\u00ae Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una denegaci\u00f3n de servicio por medio de un acceso a la red."
    }
  ],
  "id": "CVE-2019-11182",
  "lastModified": "2024-11-21T04:20:40.900",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-14T17:15:14.490",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-02-17 14:15
Modified
2024-11-21 04:59
Summary
Use of hard-coded key in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow authenticated user to potentially enable information disclosure via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:bmc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "15CF9AD6-8F14-40FC-8657-8BC57B595ED2",
              "versionEndExcluding": "2.47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E77D-DDB7-41AB-8728-9782336C167B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0431FDBE-4A58-40B1-B635-225E5B9EDBBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86739A74-AE8B-4699-8C1B-AC5D30C4FA50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD891C11-B432-4B87-96BE-7C8BFA76E801",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1000wf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5E07CC-3948-4664-AE8E-0517D9D66211",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68606D69-C913-492A-A00E-3D899AB42595",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D292D7D-1E22-440F-B30C-3C580AFE91C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89B4E6B-B742-4BCA-9547-B1C6059C6671",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Use of hard-coded key in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow authenticated user to potentially enable information disclosure via local access."
    },
    {
      "lang": "es",
      "value": "Un uso de una clave embebida en el firmware BMC para algunos Intel\u00ae Server Boards, Server Systems and Compute Modules versiones anteriores a 2.47, puede permitir que el usuario autenticado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-12376",
  "lastModified": "2024-11-21T04:59:36.473",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-02-17T14:15:15.810",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-798"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-02-17 14:15
Modified
2024-11-21 04:59
Summary
Insufficient input validation in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow an authenticated user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:bmc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "15CF9AD6-8F14-40FC-8657-8BC57B595ED2",
              "versionEndExcluding": "2.47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E77D-DDB7-41AB-8728-9782336C167B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0431FDBE-4A58-40B1-B635-225E5B9EDBBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86739A74-AE8B-4699-8C1B-AC5D30C4FA50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD891C11-B432-4B87-96BE-7C8BFA76E801",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1000wf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5E07CC-3948-4664-AE8E-0517D9D66211",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68606D69-C913-492A-A00E-3D899AB42595",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D292D7D-1E22-440F-B30C-3C580AFE91C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89B4E6B-B742-4BCA-9547-B1C6059C6671",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient input validation in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n insuficiente de la entrada en el firmware de BMC para algunos Intel\u00ae Server Boards, Server Systems and Compute Modules versiones anteriores a 2.47, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-12377",
  "lastModified": "2024-11-21T04:59:36.580",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-02-17T14:15:15.857",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Severity ?
Summary
Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.
Impacted products
Vendor Product Version
intel baseboard_management_controller_firmware *
intel bbs2600bpb -
intel bbs2600bpbr -
intel bbs2600bpq -
intel bbs2600bpqr -
intel bbs2600bps -
intel bbs2600bpsr -
intel bbs2600stb -
intel bbs2600stbr -
intel bbs2600stq -
intel bbs2600stqr -
intel hns2600bpb -
intel hns2600bpb24 -
intel hns2600bpb24r -
intel hns2600bpb24rx -
intel hns2600bpblc -
intel hns2600bpblc24 -
intel hns2600bpblc24r -
intel hns2600bpblcr -
intel hns2600bpbr -
intel hns2600bpbrx -
intel hns2600bpq -
intel hns2600bpq24 -
intel hns2600bpq24r -
intel hns2600bpqr -
intel hns2600bps -
intel hns2600bps24 -
intel hns2600bps24r -
intel hns2600bpsr -
intel hpchns2600bpbr -
intel hpchns2600bpqr -
intel hpchns2600bpsr -
intel hpcr1208wfqysr -
intel hpcr1208wftysr -
intel hpcr1304wf0ysr -
intel hpcr1304wftysr -
intel hpcr2208wf0zsr -
intel hpcr2208wfqzsr -
intel hpcr2208wftzsr -
intel hpcr2208wftzsrx -
intel hpcr2224wftzsr -
intel hpcr2308wftzsr -
intel hpcr2312wf0npr -
intel hpcr2312wftzsr -
intel r1208wfqysr -
intel r1208wftys -
intel r1208wftysr -
intel r1304wf0ys -
intel r1304wf0ysr -
intel r1304wftys -
intel r1304wftysr -
intel r2208wf0zs -
intel r2208wf0zsr -
intel r2208wfqzs -
intel r2208wfqzsr -
intel r2208wftzs -
intel r2208wftzsr -
intel r2208wftzsrx -
intel r2224wfqzs -
intel r2224wftzs -
intel r2224wftzsr -
intel r2308wftzs -
intel r2308wftzsr -
intel r2312wf0np -
intel r2312wf0npr -
intel r2312wfqzs -
intel r2312wftzs -
intel r2312wftzsr -
intel s2600stb -
intel s2600stbr -
intel s2600stq -
intel s2600stqr -
intel s2600wf0 -
intel s2600wf0r -
intel s2600wfq -
intel s2600wfqr -
intel s2600wft -
intel s2600wftr -
intel s9232wk1hlc -
intel s9232wk2hac -
intel s9232wk2hlc -
intel s9248wk1hlc -
intel s9248wk2hac -
intel s9248wk2hlc -
intel s9256wk1hlc -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22885F1F-00C7-423B-8B11-A9DB70EE6677",
              "versionEndExcluding": "2.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B49A0E57-126A-4C60-A748-5D357E7B4670",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BB3CD5-DF01-40A8-9906-5C5B306C1B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "263AF100-E101-4FEC-8CB3-8FFDB22B5E27",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3CC4D7-1756-44DB-814D-57106E6826C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECDD9533-1592-465E-B2B3-DB6077782D10",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7819ABC6-800C-4141-A31F-14CBE788EF62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC60590-8707-4B7D-A1D8-188D53F38016",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "106C758A-F23A-48B3-8360-A10212AF50E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F0759F-4583-43CF-AE0B-584A4DDAC633",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E77D-DDB7-41AB-8728-9782336C167B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AAEC7C-3538-4041-A644-515B142F6E8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0431FDBE-4A58-40B1-B635-225E5B9EDBBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86739A74-AE8B-4699-8C1B-AC5D30C4FA50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD891C11-B432-4B87-96BE-7C8BFA76E801",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABE36A4-3F68-4077-A619-743AB1FB92AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E521A2A-B231-4D00-AA1A-92B228B99E4A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1A7612-E617-43DE-826E-DDD7F968CDC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75737EC4-8161-4F09-AD90-7C7E25ACBCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83471545-E7E5-44E7-9967-2F2D808AA866",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FF75DFA-62D9-4CFE-A503-F07A56573CEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F954A5AA-AD4D-4754-8087-DF6ED312DCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50201278-AD47-468E-BA70-900399F2F758",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B062F88-6088-42AF-9B47-ACDEB88A4390",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF6884DD-0C0F-453B-A826-6360C95BD10F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA9657DC-AA1C-4B47-9286-3D7D73F9A714",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "495BFD25-08D3-4DDE-A640-5E7D85AB0560",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C74211C3-3F9D-41E8-AB5B-16205AD90B64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC998F55-2B5C-418D-9B17-23A05C75F454",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C622C8-95E1-4A7F-B3E1-4199310CF4E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D96863-E459-4C0E-B0C8-5207FC3E7962",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F92047-1D58-47E6-89AC-D4434230DB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F422B74A-AF81-4D17-AFEC-E228C5B2023E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3A107D2-6521-4C91-A35D-6E92A5A15A47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9DDFA5-349D-4451-95B1-35ACD8F1D354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B11D98E4-73ED-45D7-A224-E734283585EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "605AD870-F4F5-4159-89BE-9B29D58C04C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de sesi\u00f3n insuficiente en el firmware de Intel\u00ae Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n y/o una denegaci\u00f3n de servicio por medio de un acceso a la red."
    }
  ],
  "id": "CVE-2019-11168",
  "lastModified": "2024-11-21T04:20:39.393",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-14T17:15:13.710",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "https://support.f5.com/csp/article/K64346530?utm_source=f5support\u0026amp%3Butm_medium=RSS"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.f5.com/csp/article/K64346530?utm_source=f5support\u0026amp%3Butm_medium=RSS"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-03-14 20:29
Modified
2024-11-21 03:44
Summary
Improper memory initialization in Platform Sample/Silicon Reference firmware Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow privileged user to potentially enable an escalation of privilege via local access.
Impacted products
Vendor Product Version
intel platform_sample_firmware -
intel bbs2600bpb -
intel bbs2600bpq -
intel bbs2600bps -
intel bbs2600stb -
intel bbs2600stq -
intel bbs7200ap -
intel bbs7200apl -
intel dbs2600cw2r -
intel dbs2600cw2sr -
intel dbs2600cwtr -
intel dbs2600cwtsr -
intel hns2600bpb -
intel hns2600bpb24 -
intel hns2600bpblc -
intel hns2600bpblc24 -
intel hns2600bpq -
intel hns2600bpq24 -
intel hns2600bps -
intel hns2600bps24 -
intel hns2600kpfr -
intel hns2600kpr -
intel hns2600tp24r -
intel hns2600tp24sr -
intel hns2600tp24str -
intel hns2600tpfr -
intel hns2600tpnr -
intel hns2600tpr -
intel hns7200ap -
intel hns7200apl -
intel hns7200apr -
intel hns7200aprl -
intel r1208wftys -
intel r1208wt2gsr -
intel r1208wttgsr -
intel r1304wf0ys -
intel r1304wftys -
intel r1304wt2gsr -
intel r1304wttgsr -
intel r2208wf0zs -
intel r2208wfqzs -
intel r2208wftzs -
intel r2208wt2ysr -
intel r2208wttyc1r -
intel r2208wttysr -
intel r2224wfqzs -
intel r2224wftzs -
intel r2224wttysr -
intel r2308wftzs -
intel r2308wttysr -
intel r2312wf0np -
intel r2312wfqzs -
intel r2312wftzs -
intel r2312wttysr -
intel s2600kpfr -
intel s2600kpr -
intel s2600kptr -
intel s2600stb -
intel s2600stq -
intel s2600tpfr -
intel s2600tpnr -
intel s2600tpr -
intel s2600tptr -
intel s2600wfo -
intel s2600wfq -
intel s2600wft -
intel s2600wt2r -
intel s2600wttr -
intel s2600wtts1r -
intel s7200apr -
intel silicon_reference_firmware -
intel bbs2600bpb -
intel bbs2600bpq -
intel bbs2600bps -
intel bbs2600stb -
intel bbs2600stq -
intel bbs7200ap -
intel bbs7200apl -
intel dbs2600cw2r -
intel dbs2600cw2sr -
intel dbs2600cwtr -
intel dbs2600cwtsr -
intel hns2600bpb -
intel hns2600bpb24 -
intel hns2600bpblc -
intel hns2600bpblc24 -
intel hns2600bpq -
intel hns2600bpq24 -
intel hns2600bps -
intel hns2600bps24 -
intel hns2600kpfr -
intel hns2600kpr -
intel hns2600tp24r -
intel hns2600tp24sr -
intel hns2600tp24str -
intel hns2600tpfr -
intel hns2600tpnr -
intel hns2600tpr -
intel hns7200ap -
intel hns7200apl -
intel hns7200apr -
intel hns7200aprl -
intel r1208wftys -
intel r1208wt2gsr -
intel r1208wttgsr -
intel r1304wf0ys -
intel r1304wftys -
intel r1304wt2gsr -
intel r1304wttgsr -
intel r2208wf0zs -
intel r2208wfqzs -
intel r2208wftzs -
intel r2208wt2ysr -
intel r2208wttyc1r -
intel r2208wttysr -
intel r2224wfqzs -
intel r2224wftzs -
intel r2224wttysr -
intel r2308wftzs -
intel r2308wttysr -
intel r2312wf0np -
intel r2312wfqzs -
intel r2312wftzs -
intel r2312wttysr -
intel s2600kpfr -
intel s2600kpr -
intel s2600kptr -
intel s2600stb -
intel s2600stq -
intel s2600tpfr -
intel s2600tpnr -
intel s2600tpr -
intel s2600tptr -
intel s2600wfo -
intel s2600wfq -
intel s2600wft -
intel s2600wt2r -
intel s2600wttr -
intel s2600wtts1r -
intel s7200apr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:platform_sample_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CDA75B0-0DB9-4E0E-BF2C-724572FFB46F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B49A0E57-126A-4C60-A748-5D357E7B4670",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BB3CD5-DF01-40A8-9906-5C5B306C1B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3CC4D7-1756-44DB-814D-57106E6826C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7819ABC6-800C-4141-A31F-14CBE788EF62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "106C758A-F23A-48B3-8360-A10212AF50E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs7200ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D299D95-DA1B-4EB0-B424-367223B1728C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs7200apl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD07AA71-7FDA-4FF9-AFE9-E5F4797FAC63",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dbs2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41FC06AE-A60D-4A9D-9EC9-5E0B55098CFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dbs2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAEE9115-02E3-451B-B102-32DD51CB890B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dbs2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90B4B99C-FCA8-496A-9673-F665C909D578",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dbs2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CB91448-FA68-4D4F-9432-F38ACD8C6591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4561DCAF-5A12-4A35-93A0-8F097D22F275",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2A50B12-5F1A-4F42-807A-EE73668C9690",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12F99059-4FE6-49AB-AA9D-4890C2D747FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD725F8F-76BC-4A20-A02D-0A68B67CA401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600tp24str:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "635E397E-BB32-4C2F-A19F-7C1219A726D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6507AB9B-5925-4F6C-9641-9806A226B3CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600tpnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F01C4D33-AED6-427D-8631-E4763410C93F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B69B157-19C4-4CF4-8762-97030DD01A15",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns7200ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE3E826A-6B5B-4445-9D09-0D3C65276259",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns7200apl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F95ADEA-F861-45B2-AE47-390C311FC97F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns7200apr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "254CB73B-6A91-408F-A3C9-D3259BC2EF9F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns7200aprl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BCA0A87-6776-4711-8692-03C0DFD01779",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3F0A597-424D-47D0-BEA5-C92952331B65",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA90242-9E50-4B94-ACCC-9DAC55170A90",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ADAC3B8-CBDC-4AF5-9C16-D90E6E4D1D5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FD433E7-99ED-4354-BC25-577F65A387D2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DF49DB1-997F-4FF3-989F-7CCC3D328C33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3087F420-9904-4FA8-9D29-433A3F7838B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C15931E-37B8-420E-8252-2311329DD187",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3FEDE2-915F-4691-B3A5-14EE27D95167",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "717726C8-2648-4A98-8B9A-5999F68AEC6A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CE3087A-A327-46B9-BE16-4C1A57FAEE3F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D9C9254-43DE-4DC9-A246-75C76B4C45B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "540DFDF8-E420-45E9-8E81-BAE9EAE3D1C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40EE02E9-BE39-425A-82CB-1BD4C5D9B899",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDF6DBFD-8223-4EAC-B6B0-F721C91727A2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600tpnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C911A0CB-EF89-4295-9761-AAF687E2F8CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2DBEFE-CFBF-4424-A12B-C3A4C49E594C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600tptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B737A9A-A013-4AFB-A355-6FF96AACBAA1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CDAD0D9-C4DD-42B5-AC7F-4C53F406B762",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12161640-C1D6-49A7-840C-5E3DCC0B5707",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D97AAF4-938D-4B28-BEF1-D5F978AE3B7D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wtts1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1993088-729D-477E-9210-E49432177C57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s7200apr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F73E6B49-70E1-4FC0-9349-9EAFA9B622BA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:silicon_reference_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB336210-AC71-4DFA-878F-647EC94DF495",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B49A0E57-126A-4C60-A748-5D357E7B4670",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BB3CD5-DF01-40A8-9906-5C5B306C1B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3CC4D7-1756-44DB-814D-57106E6826C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7819ABC6-800C-4141-A31F-14CBE788EF62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "106C758A-F23A-48B3-8360-A10212AF50E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs7200ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D299D95-DA1B-4EB0-B424-367223B1728C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs7200apl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD07AA71-7FDA-4FF9-AFE9-E5F4797FAC63",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dbs2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41FC06AE-A60D-4A9D-9EC9-5E0B55098CFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dbs2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAEE9115-02E3-451B-B102-32DD51CB890B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dbs2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90B4B99C-FCA8-496A-9673-F665C909D578",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dbs2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CB91448-FA68-4D4F-9432-F38ACD8C6591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4561DCAF-5A12-4A35-93A0-8F097D22F275",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2A50B12-5F1A-4F42-807A-EE73668C9690",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12F99059-4FE6-49AB-AA9D-4890C2D747FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD725F8F-76BC-4A20-A02D-0A68B67CA401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600tp24str:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "635E397E-BB32-4C2F-A19F-7C1219A726D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6507AB9B-5925-4F6C-9641-9806A226B3CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600tpnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F01C4D33-AED6-427D-8631-E4763410C93F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B69B157-19C4-4CF4-8762-97030DD01A15",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns7200ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE3E826A-6B5B-4445-9D09-0D3C65276259",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns7200apl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F95ADEA-F861-45B2-AE47-390C311FC97F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns7200apr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "254CB73B-6A91-408F-A3C9-D3259BC2EF9F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns7200aprl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BCA0A87-6776-4711-8692-03C0DFD01779",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3F0A597-424D-47D0-BEA5-C92952331B65",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA90242-9E50-4B94-ACCC-9DAC55170A90",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ADAC3B8-CBDC-4AF5-9C16-D90E6E4D1D5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FD433E7-99ED-4354-BC25-577F65A387D2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DF49DB1-997F-4FF3-989F-7CCC3D328C33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3087F420-9904-4FA8-9D29-433A3F7838B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C15931E-37B8-420E-8252-2311329DD187",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3FEDE2-915F-4691-B3A5-14EE27D95167",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "717726C8-2648-4A98-8B9A-5999F68AEC6A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CE3087A-A327-46B9-BE16-4C1A57FAEE3F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D9C9254-43DE-4DC9-A246-75C76B4C45B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "540DFDF8-E420-45E9-8E81-BAE9EAE3D1C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40EE02E9-BE39-425A-82CB-1BD4C5D9B899",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDF6DBFD-8223-4EAC-B6B0-F721C91727A2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600tpnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C911A0CB-EF89-4295-9761-AAF687E2F8CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2DBEFE-CFBF-4424-A12B-C3A4C49E594C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600tptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B737A9A-A013-4AFB-A355-6FF96AACBAA1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CDAD0D9-C4DD-42B5-AC7F-4C53F406B762",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12161640-C1D6-49A7-840C-5E3DCC0B5707",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D97AAF4-938D-4B28-BEF1-D5F978AE3B7D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wtts1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1993088-729D-477E-9210-E49432177C57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s7200apr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F73E6B49-70E1-4FC0-9349-9EAFA9B622BA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper memory initialization in Platform Sample/Silicon Reference firmware Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow privileged user to potentially enable an escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "La inicializaci\u00f3n inadecuada en Platform Sample/Silicon Reference firmware Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module) puede permitir que el usuario privilegiado habilite potencialmente una escalada de privilegios a trav\u00e9s del acceso local."
    }
  ],
  "id": "CVE-2018-12204",
  "lastModified": "2024-11-21T03:44:44.900",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-03-14T20:29:00.770",
  "references": [
    {
      "source": "secure@intel.com",
      "url": "https://security.netapp.com/advisory/ntap-20190318-0002/"
    },
    {
      "source": "secure@intel.com",
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
    },
    {
      "source": "secure@intel.com",
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03929en_us"
    },
    {
      "source": "secure@intel.com",
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03978en_us"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.netapp.com/advisory/ntap-20190318-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03929en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03978en_us"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-665"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Unhandled exception in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.
Impacted products
Vendor Product Version
intel baseboard_management_controller_firmware *
intel bbs2600bpb -
intel bbs2600bpbr -
intel bbs2600bpq -
intel bbs2600bpqr -
intel bbs2600bps -
intel bbs2600bpsr -
intel bbs2600stb -
intel bbs2600stbr -
intel bbs2600stq -
intel bbs2600stqr -
intel hns2600bpb -
intel hns2600bpb24 -
intel hns2600bpb24r -
intel hns2600bpb24rx -
intel hns2600bpblc -
intel hns2600bpblc24 -
intel hns2600bpblc24r -
intel hns2600bpblcr -
intel hns2600bpbr -
intel hns2600bpbrx -
intel hns2600bpq -
intel hns2600bpq24 -
intel hns2600bpq24r -
intel hns2600bpqr -
intel hns2600bps -
intel hns2600bps24 -
intel hns2600bps24r -
intel hns2600bpsr -
intel hpchns2600bpbr -
intel hpchns2600bpqr -
intel hpchns2600bpsr -
intel hpcr1208wfqysr -
intel hpcr1208wftysr -
intel hpcr1304wf0ysr -
intel hpcr1304wftysr -
intel hpcr2208wf0zsr -
intel hpcr2208wfqzsr -
intel hpcr2208wftzsr -
intel hpcr2208wftzsrx -
intel hpcr2224wftzsr -
intel hpcr2308wftzsr -
intel hpcr2312wf0npr -
intel hpcr2312wftzsr -
intel r1208wfqysr -
intel r1208wftys -
intel r1208wftysr -
intel r1304wf0ys -
intel r1304wf0ysr -
intel r1304wftys -
intel r1304wftysr -
intel r2208wf0zs -
intel r2208wf0zsr -
intel r2208wfqzs -
intel r2208wfqzsr -
intel r2208wftzs -
intel r2208wftzsr -
intel r2208wftzsrx -
intel r2224wfqzs -
intel r2224wftzs -
intel r2224wftzsr -
intel r2308wftzs -
intel r2308wftzsr -
intel r2312wf0np -
intel r2312wf0npr -
intel r2312wfqzs -
intel r2312wftzs -
intel r2312wftzsr -
intel s2600stb -
intel s2600stbr -
intel s2600stq -
intel s2600stqr -
intel s2600wf0 -
intel s2600wf0r -
intel s2600wfq -
intel s2600wfqr -
intel s2600wft -
intel s2600wftr -
intel s9232wk1hlc -
intel s9232wk2hac -
intel s9232wk2hlc -
intel s9248wk1hlc -
intel s9248wk2hac -
intel s9248wk2hlc -
intel s9256wk1hlc -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22885F1F-00C7-423B-8B11-A9DB70EE6677",
              "versionEndExcluding": "2.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B49A0E57-126A-4C60-A748-5D357E7B4670",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BB3CD5-DF01-40A8-9906-5C5B306C1B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "263AF100-E101-4FEC-8CB3-8FFDB22B5E27",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3CC4D7-1756-44DB-814D-57106E6826C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECDD9533-1592-465E-B2B3-DB6077782D10",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7819ABC6-800C-4141-A31F-14CBE788EF62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC60590-8707-4B7D-A1D8-188D53F38016",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "106C758A-F23A-48B3-8360-A10212AF50E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F0759F-4583-43CF-AE0B-584A4DDAC633",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E77D-DDB7-41AB-8728-9782336C167B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AAEC7C-3538-4041-A644-515B142F6E8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0431FDBE-4A58-40B1-B635-225E5B9EDBBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86739A74-AE8B-4699-8C1B-AC5D30C4FA50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD891C11-B432-4B87-96BE-7C8BFA76E801",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABE36A4-3F68-4077-A619-743AB1FB92AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E521A2A-B231-4D00-AA1A-92B228B99E4A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1A7612-E617-43DE-826E-DDD7F968CDC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75737EC4-8161-4F09-AD90-7C7E25ACBCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83471545-E7E5-44E7-9967-2F2D808AA866",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FF75DFA-62D9-4CFE-A503-F07A56573CEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F954A5AA-AD4D-4754-8087-DF6ED312DCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50201278-AD47-468E-BA70-900399F2F758",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B062F88-6088-42AF-9B47-ACDEB88A4390",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF6884DD-0C0F-453B-A826-6360C95BD10F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA9657DC-AA1C-4B47-9286-3D7D73F9A714",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "495BFD25-08D3-4DDE-A640-5E7D85AB0560",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C74211C3-3F9D-41E8-AB5B-16205AD90B64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC998F55-2B5C-418D-9B17-23A05C75F454",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C622C8-95E1-4A7F-B3E1-4199310CF4E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D96863-E459-4C0E-B0C8-5207FC3E7962",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F92047-1D58-47E6-89AC-D4434230DB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F422B74A-AF81-4D17-AFEC-E228C5B2023E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3A107D2-6521-4C91-A35D-6E92A5A15A47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9DDFA5-349D-4451-95B1-35ACD8F1D354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B11D98E4-73ED-45D7-A224-E734283585EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "605AD870-F4F5-4159-89BE-9B29D58C04C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unhandled exception in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access."
    },
    {
      "lang": "es",
      "value": "Una excepci\u00f3n no manejada en el firmware de Intel\u00ae Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una denegaci\u00f3n de servicio por medio de un acceso a la red."
    }
  ],
  "id": "CVE-2019-11177",
  "lastModified": "2024-11-21T04:20:40.267",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-14T17:15:14.117",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-755"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-07-10 21:29
Modified
2024-11-21 04:05
Summary
BMC Firmware in Intel server boards, compute modules, and systems potentially allow an attacker with administrative privileges to make unauthorized read\writes to the SMBUS.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:bmc_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46F5C6D3-58EB-4243-BEBD-93912CAA7DC6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B49A0E57-126A-4C60-A748-5D357E7B4670",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BB3CD5-DF01-40A8-9906-5C5B306C1B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3CC4D7-1756-44DB-814D-57106E6826C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7819ABC6-800C-4141-A31F-14CBE788EF62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "106C758A-F23A-48B3-8360-A10212AF50E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs7200ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D299D95-DA1B-4EB0-B424-367223B1728C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs7200apl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD07AA71-7FDA-4FF9-AFE9-E5F4797FAC63",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dbs2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41FC06AE-A60D-4A9D-9EC9-5E0B55098CFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dbs2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAEE9115-02E3-451B-B102-32DD51CB890B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dbs2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90B4B99C-FCA8-496A-9673-F665C909D578",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:dbs2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CB91448-FA68-4D4F-9432-F38ACD8C6591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4561DCAF-5A12-4A35-93A0-8F097D22F275",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2A50B12-5F1A-4F42-807A-EE73668C9690",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12F99059-4FE6-49AB-AA9D-4890C2D747FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD725F8F-76BC-4A20-A02D-0A68B67CA401",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600tp24str:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "635E397E-BB32-4C2F-A19F-7C1219A726D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6507AB9B-5925-4F6C-9641-9806A226B3CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600tpnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F01C4D33-AED6-427D-8631-E4763410C93F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B69B157-19C4-4CF4-8762-97030DD01A15",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns7200ap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE3E826A-6B5B-4445-9D09-0D3C65276259",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns7200apl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F95ADEA-F861-45B2-AE47-390C311FC97F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns7200apr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "254CB73B-6A91-408F-A3C9-D3259BC2EF9F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns7200aprl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BCA0A87-6776-4711-8692-03C0DFD01779",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3F0A597-424D-47D0-BEA5-C92952331B65",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABA90242-9E50-4B94-ACCC-9DAC55170A90",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ADAC3B8-CBDC-4AF5-9C16-D90E6E4D1D5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FD433E7-99ED-4354-BC25-577F65A387D2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DF49DB1-997F-4FF3-989F-7CCC3D328C33",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3087F420-9904-4FA8-9D29-433A3F7838B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C15931E-37B8-420E-8252-2311329DD187",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B3FEDE2-915F-4691-B3A5-14EE27D95167",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "717726C8-2648-4A98-8B9A-5999F68AEC6A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CE3087A-A327-46B9-BE16-4C1A57FAEE3F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D9C9254-43DE-4DC9-A246-75C76B4C45B3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "540DFDF8-E420-45E9-8E81-BAE9EAE3D1C8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40EE02E9-BE39-425A-82CB-1BD4C5D9B899",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDF6DBFD-8223-4EAC-B6B0-F721C91727A2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600tpnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C911A0CB-EF89-4295-9761-AAF687E2F8CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2DBEFE-CFBF-4424-A12B-C3A4C49E594C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600tptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B737A9A-A013-4AFB-A355-6FF96AACBAA1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CDAD0D9-C4DD-42B5-AC7F-4C53F406B762",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "12161640-C1D6-49A7-840C-5E3DCC0B5707",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D97AAF4-938D-4B28-BEF1-D5F978AE3B7D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wtts1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1993088-729D-477E-9210-E49432177C57",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s7200apr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F73E6B49-70E1-4FC0-9349-9EAFA9B622BA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "BMC Firmware in Intel server boards, compute modules, and systems potentially allow an attacker with administrative privileges to make unauthorized read\\writes to the SMBUS."
    },
    {
      "lang": "es",
      "value": "El firmware BMC en las placas para servidores, los m\u00f3dulos de computaci\u00f3n y los sistemas Intel podr\u00edan permitir que un atacante con privilegios administrativos realice lecturas/escrituras no autorizadas al SMBUS."
    }
  ],
  "id": "CVE-2018-3682",
  "lastModified": "2024-11-21T04:05:53.010",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-07-10T21:29:01.107",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00130.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00130.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Authentication bypass in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via local access.
Impacted products
Vendor Product Version
intel baseboard_management_controller_firmware *
intel bbs2600bpb -
intel bbs2600bpbr -
intel bbs2600bpq -
intel bbs2600bpqr -
intel bbs2600bps -
intel bbs2600bpsr -
intel bbs2600stb -
intel bbs2600stbr -
intel bbs2600stq -
intel bbs2600stqr -
intel hns2600bpb -
intel hns2600bpb24 -
intel hns2600bpb24r -
intel hns2600bpb24rx -
intel hns2600bpblc -
intel hns2600bpblc24 -
intel hns2600bpblc24r -
intel hns2600bpblcr -
intel hns2600bpbr -
intel hns2600bpbrx -
intel hns2600bpq -
intel hns2600bpq24 -
intel hns2600bpq24r -
intel hns2600bpqr -
intel hns2600bps -
intel hns2600bps24 -
intel hns2600bps24r -
intel hns2600bpsr -
intel hpchns2600bpbr -
intel hpchns2600bpqr -
intel hpchns2600bpsr -
intel hpcr1208wfqysr -
intel hpcr1208wftysr -
intel hpcr1304wf0ysr -
intel hpcr1304wftysr -
intel hpcr2208wf0zsr -
intel hpcr2208wfqzsr -
intel hpcr2208wftzsr -
intel hpcr2208wftzsrx -
intel hpcr2224wftzsr -
intel hpcr2308wftzsr -
intel hpcr2312wf0npr -
intel hpcr2312wftzsr -
intel r1208wfqysr -
intel r1208wftys -
intel r1208wftysr -
intel r1304wf0ys -
intel r1304wf0ysr -
intel r1304wftys -
intel r1304wftysr -
intel r2208wf0zs -
intel r2208wf0zsr -
intel r2208wfqzs -
intel r2208wfqzsr -
intel r2208wftzs -
intel r2208wftzsr -
intel r2208wftzsrx -
intel r2224wfqzs -
intel r2224wftzs -
intel r2224wftzsr -
intel r2308wftzs -
intel r2308wftzsr -
intel r2312wf0np -
intel r2312wf0npr -
intel r2312wfqzs -
intel r2312wftzs -
intel r2312wftzsr -
intel s2600stb -
intel s2600stbr -
intel s2600stq -
intel s2600stqr -
intel s2600wf0 -
intel s2600wf0r -
intel s2600wfq -
intel s2600wfqr -
intel s2600wft -
intel s2600wftr -
intel s9232wk1hlc -
intel s9232wk2hac -
intel s9232wk2hlc -
intel s9248wk1hlc -
intel s9248wk2hac -
intel s9248wk2hlc -
intel s9256wk1hlc -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22885F1F-00C7-423B-8B11-A9DB70EE6677",
              "versionEndExcluding": "2.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B49A0E57-126A-4C60-A748-5D357E7B4670",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BB3CD5-DF01-40A8-9906-5C5B306C1B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "263AF100-E101-4FEC-8CB3-8FFDB22B5E27",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3CC4D7-1756-44DB-814D-57106E6826C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECDD9533-1592-465E-B2B3-DB6077782D10",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7819ABC6-800C-4141-A31F-14CBE788EF62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC60590-8707-4B7D-A1D8-188D53F38016",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "106C758A-F23A-48B3-8360-A10212AF50E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F0759F-4583-43CF-AE0B-584A4DDAC633",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E77D-DDB7-41AB-8728-9782336C167B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AAEC7C-3538-4041-A644-515B142F6E8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0431FDBE-4A58-40B1-B635-225E5B9EDBBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86739A74-AE8B-4699-8C1B-AC5D30C4FA50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD891C11-B432-4B87-96BE-7C8BFA76E801",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABE36A4-3F68-4077-A619-743AB1FB92AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E521A2A-B231-4D00-AA1A-92B228B99E4A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1A7612-E617-43DE-826E-DDD7F968CDC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75737EC4-8161-4F09-AD90-7C7E25ACBCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83471545-E7E5-44E7-9967-2F2D808AA866",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FF75DFA-62D9-4CFE-A503-F07A56573CEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F954A5AA-AD4D-4754-8087-DF6ED312DCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50201278-AD47-468E-BA70-900399F2F758",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B062F88-6088-42AF-9B47-ACDEB88A4390",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF6884DD-0C0F-453B-A826-6360C95BD10F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA9657DC-AA1C-4B47-9286-3D7D73F9A714",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "495BFD25-08D3-4DDE-A640-5E7D85AB0560",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C74211C3-3F9D-41E8-AB5B-16205AD90B64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC998F55-2B5C-418D-9B17-23A05C75F454",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C622C8-95E1-4A7F-B3E1-4199310CF4E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D96863-E459-4C0E-B0C8-5207FC3E7962",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F92047-1D58-47E6-89AC-D4434230DB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F422B74A-AF81-4D17-AFEC-E228C5B2023E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3A107D2-6521-4C91-A35D-6E92A5A15A47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9DDFA5-349D-4451-95B1-35ACD8F1D354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B11D98E4-73ED-45D7-A224-E734283585EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "605AD870-F4F5-4159-89BE-9B29D58C04C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Authentication bypass in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Una omisi\u00f3n de autenticaci\u00f3n en el firmware de Intel\u00ae Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n, una escalada de privilegios y/o una denegaci\u00f3n de servicio por medio de un acceso local."
    }
  ],
  "id": "CVE-2019-11170",
  "lastModified": "2024-11-21T04:20:39.533",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-14T17:15:13.757",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access.
Impacted products
Vendor Product Version
intel baseboard_management_controller_firmware *
intel bbs2600bpb -
intel bbs2600bpbr -
intel bbs2600bpq -
intel bbs2600bpqr -
intel bbs2600bps -
intel bbs2600bpsr -
intel bbs2600stb -
intel bbs2600stbr -
intel bbs2600stq -
intel bbs2600stqr -
intel hns2600bpb -
intel hns2600bpb24 -
intel hns2600bpb24r -
intel hns2600bpb24rx -
intel hns2600bpblc -
intel hns2600bpblc24 -
intel hns2600bpblc24r -
intel hns2600bpblcr -
intel hns2600bpbr -
intel hns2600bpbrx -
intel hns2600bpq -
intel hns2600bpq24 -
intel hns2600bpq24r -
intel hns2600bpqr -
intel hns2600bps -
intel hns2600bps24 -
intel hns2600bps24r -
intel hns2600bpsr -
intel hpchns2600bpbr -
intel hpchns2600bpqr -
intel hpchns2600bpsr -
intel hpcr1208wfqysr -
intel hpcr1208wftysr -
intel hpcr1304wf0ysr -
intel hpcr1304wftysr -
intel hpcr2208wf0zsr -
intel hpcr2208wfqzsr -
intel hpcr2208wftzsr -
intel hpcr2208wftzsrx -
intel hpcr2224wftzsr -
intel hpcr2308wftzsr -
intel hpcr2312wf0npr -
intel hpcr2312wftzsr -
intel r1208wfqysr -
intel r1208wftys -
intel r1208wftysr -
intel r1304wf0ys -
intel r1304wf0ysr -
intel r1304wftys -
intel r1304wftysr -
intel r2208wf0zs -
intel r2208wf0zsr -
intel r2208wfqzs -
intel r2208wfqzsr -
intel r2208wftzs -
intel r2208wftzsr -
intel r2208wftzsrx -
intel r2224wfqzs -
intel r2224wftzs -
intel r2224wftzsr -
intel r2308wftzs -
intel r2308wftzsr -
intel r2312wf0np -
intel r2312wf0npr -
intel r2312wfqzs -
intel r2312wftzs -
intel r2312wftzsr -
intel s2600stb -
intel s2600stbr -
intel s2600stq -
intel s2600stqr -
intel s2600wf0 -
intel s2600wf0r -
intel s2600wfq -
intel s2600wfqr -
intel s2600wft -
intel s2600wftr -
intel s9232wk1hlc -
intel s9232wk2hac -
intel s9232wk2hlc -
intel s9248wk1hlc -
intel s9248wk2hac -
intel s9248wk2hlc -
intel s9256wk1hlc -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22885F1F-00C7-423B-8B11-A9DB70EE6677",
              "versionEndExcluding": "2.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B49A0E57-126A-4C60-A748-5D357E7B4670",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BB3CD5-DF01-40A8-9906-5C5B306C1B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "263AF100-E101-4FEC-8CB3-8FFDB22B5E27",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3CC4D7-1756-44DB-814D-57106E6826C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECDD9533-1592-465E-B2B3-DB6077782D10",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7819ABC6-800C-4141-A31F-14CBE788EF62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC60590-8707-4B7D-A1D8-188D53F38016",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "106C758A-F23A-48B3-8360-A10212AF50E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F0759F-4583-43CF-AE0B-584A4DDAC633",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E77D-DDB7-41AB-8728-9782336C167B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AAEC7C-3538-4041-A644-515B142F6E8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0431FDBE-4A58-40B1-B635-225E5B9EDBBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86739A74-AE8B-4699-8C1B-AC5D30C4FA50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD891C11-B432-4B87-96BE-7C8BFA76E801",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABE36A4-3F68-4077-A619-743AB1FB92AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E521A2A-B231-4D00-AA1A-92B228B99E4A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1A7612-E617-43DE-826E-DDD7F968CDC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75737EC4-8161-4F09-AD90-7C7E25ACBCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83471545-E7E5-44E7-9967-2F2D808AA866",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FF75DFA-62D9-4CFE-A503-F07A56573CEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F954A5AA-AD4D-4754-8087-DF6ED312DCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50201278-AD47-468E-BA70-900399F2F758",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B062F88-6088-42AF-9B47-ACDEB88A4390",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF6884DD-0C0F-453B-A826-6360C95BD10F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA9657DC-AA1C-4B47-9286-3D7D73F9A714",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "495BFD25-08D3-4DDE-A640-5E7D85AB0560",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C74211C3-3F9D-41E8-AB5B-16205AD90B64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC998F55-2B5C-418D-9B17-23A05C75F454",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C622C8-95E1-4A7F-B3E1-4199310CF4E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D96863-E459-4C0E-B0C8-5207FC3E7962",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F92047-1D58-47E6-89AC-D4434230DB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F422B74A-AF81-4D17-AFEC-E228C5B2023E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3A107D2-6521-4C91-A35D-6E92A5A15A47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9DDFA5-349D-4451-95B1-35ACD8F1D354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B11D98E4-73ED-45D7-A224-E734283585EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "605AD870-F4F5-4159-89BE-9B29D58C04C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access."
    },
    {
      "lang": "es",
      "value": "Una lectura fuera de l\u00edmite en el firmware de Intel\u00ae Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso a la red."
    }
  ],
  "id": "CVE-2019-11172",
  "lastModified": "2024-11-21T04:20:39.793",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-14T17:15:13.880",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.
Impacted products
Vendor Product Version
intel baseboard_management_controller_firmware *
intel bbs2600bpb -
intel bbs2600bpbr -
intel bbs2600bpq -
intel bbs2600bpqr -
intel bbs2600bps -
intel bbs2600bpsr -
intel bbs2600stb -
intel bbs2600stbr -
intel bbs2600stq -
intel bbs2600stqr -
intel hns2600bpb -
intel hns2600bpb24 -
intel hns2600bpb24r -
intel hns2600bpb24rx -
intel hns2600bpblc -
intel hns2600bpblc24 -
intel hns2600bpblc24r -
intel hns2600bpblcr -
intel hns2600bpbr -
intel hns2600bpbrx -
intel hns2600bpq -
intel hns2600bpq24 -
intel hns2600bpq24r -
intel hns2600bpqr -
intel hns2600bps -
intel hns2600bps24 -
intel hns2600bps24r -
intel hns2600bpsr -
intel hpchns2600bpbr -
intel hpchns2600bpqr -
intel hpchns2600bpsr -
intel hpcr1208wfqysr -
intel hpcr1208wftysr -
intel hpcr1304wf0ysr -
intel hpcr1304wftysr -
intel hpcr2208wf0zsr -
intel hpcr2208wfqzsr -
intel hpcr2208wftzsr -
intel hpcr2208wftzsrx -
intel hpcr2224wftzsr -
intel hpcr2308wftzsr -
intel hpcr2312wf0npr -
intel hpcr2312wftzsr -
intel r1208wfqysr -
intel r1208wftys -
intel r1208wftysr -
intel r1304wf0ys -
intel r1304wf0ysr -
intel r1304wftys -
intel r1304wftysr -
intel r2208wf0zs -
intel r2208wf0zsr -
intel r2208wfqzs -
intel r2208wfqzsr -
intel r2208wftzs -
intel r2208wftzsr -
intel r2208wftzsrx -
intel r2224wfqzs -
intel r2224wftzs -
intel r2224wftzsr -
intel r2308wftzs -
intel r2308wftzsr -
intel r2312wf0np -
intel r2312wf0npr -
intel r2312wfqzs -
intel r2312wftzs -
intel r2312wftzsr -
intel s2600stb -
intel s2600stbr -
intel s2600stq -
intel s2600stqr -
intel s2600wf0 -
intel s2600wf0r -
intel s2600wfq -
intel s2600wfqr -
intel s2600wft -
intel s2600wftr -
intel s9232wk1hlc -
intel s9232wk2hac -
intel s9232wk2hlc -
intel s9248wk1hlc -
intel s9248wk2hac -
intel s9248wk2hlc -
intel s9256wk1hlc -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22885F1F-00C7-423B-8B11-A9DB70EE6677",
              "versionEndExcluding": "2.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B49A0E57-126A-4C60-A748-5D357E7B4670",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BB3CD5-DF01-40A8-9906-5C5B306C1B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "263AF100-E101-4FEC-8CB3-8FFDB22B5E27",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3CC4D7-1756-44DB-814D-57106E6826C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECDD9533-1592-465E-B2B3-DB6077782D10",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7819ABC6-800C-4141-A31F-14CBE788EF62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC60590-8707-4B7D-A1D8-188D53F38016",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "106C758A-F23A-48B3-8360-A10212AF50E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F0759F-4583-43CF-AE0B-584A4DDAC633",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E77D-DDB7-41AB-8728-9782336C167B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AAEC7C-3538-4041-A644-515B142F6E8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0431FDBE-4A58-40B1-B635-225E5B9EDBBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86739A74-AE8B-4699-8C1B-AC5D30C4FA50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD891C11-B432-4B87-96BE-7C8BFA76E801",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABE36A4-3F68-4077-A619-743AB1FB92AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E521A2A-B231-4D00-AA1A-92B228B99E4A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1A7612-E617-43DE-826E-DDD7F968CDC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75737EC4-8161-4F09-AD90-7C7E25ACBCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83471545-E7E5-44E7-9967-2F2D808AA866",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FF75DFA-62D9-4CFE-A503-F07A56573CEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F954A5AA-AD4D-4754-8087-DF6ED312DCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50201278-AD47-468E-BA70-900399F2F758",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B062F88-6088-42AF-9B47-ACDEB88A4390",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF6884DD-0C0F-453B-A826-6360C95BD10F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA9657DC-AA1C-4B47-9286-3D7D73F9A714",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "495BFD25-08D3-4DDE-A640-5E7D85AB0560",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C74211C3-3F9D-41E8-AB5B-16205AD90B64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC998F55-2B5C-418D-9B17-23A05C75F454",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C622C8-95E1-4A7F-B3E1-4199310CF4E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D96863-E459-4C0E-B0C8-5207FC3E7962",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F92047-1D58-47E6-89AC-D4434230DB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F422B74A-AF81-4D17-AFEC-E228C5B2023E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3A107D2-6521-4C91-A35D-6E92A5A15A47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9DDFA5-349D-4451-95B1-35ACD8F1D354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B11D98E4-73ED-45D7-A224-E734283585EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "605AD870-F4F5-4159-89BE-9B29D58C04C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada insuficiente en el firmware de Intel\u00ae Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una denegaci\u00f3n de servicio por medio de un acceso a la red."
    }
  ],
  "id": "CVE-2019-11175",
  "lastModified": "2024-11-21T04:20:40.133",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-14T17:15:14.067",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure via network access.
Impacted products
Vendor Product Version
intel baseboard_management_controller_firmware *
intel bbs2600bpb -
intel bbs2600bpbr -
intel bbs2600bpq -
intel bbs2600bpqr -
intel bbs2600bps -
intel bbs2600bpsr -
intel bbs2600stb -
intel bbs2600stbr -
intel bbs2600stq -
intel bbs2600stqr -
intel hns2600bpb -
intel hns2600bpb24 -
intel hns2600bpb24r -
intel hns2600bpb24rx -
intel hns2600bpblc -
intel hns2600bpblc24 -
intel hns2600bpblc24r -
intel hns2600bpblcr -
intel hns2600bpbr -
intel hns2600bpbrx -
intel hns2600bpq -
intel hns2600bpq24 -
intel hns2600bpq24r -
intel hns2600bpqr -
intel hns2600bps -
intel hns2600bps24 -
intel hns2600bps24r -
intel hns2600bpsr -
intel hpchns2600bpbr -
intel hpchns2600bpqr -
intel hpchns2600bpsr -
intel hpcr1208wfqysr -
intel hpcr1208wftysr -
intel hpcr1304wf0ysr -
intel hpcr1304wftysr -
intel hpcr2208wf0zsr -
intel hpcr2208wfqzsr -
intel hpcr2208wftzsr -
intel hpcr2208wftzsrx -
intel hpcr2224wftzsr -
intel hpcr2308wftzsr -
intel hpcr2312wf0npr -
intel hpcr2312wftzsr -
intel r1208wfqysr -
intel r1208wftys -
intel r1208wftysr -
intel r1304wf0ys -
intel r1304wf0ysr -
intel r1304wftys -
intel r1304wftysr -
intel r2208wf0zs -
intel r2208wf0zsr -
intel r2208wfqzs -
intel r2208wfqzsr -
intel r2208wftzs -
intel r2208wftzsr -
intel r2208wftzsrx -
intel r2224wfqzs -
intel r2224wftzs -
intel r2224wftzsr -
intel r2308wftzs -
intel r2308wftzsr -
intel r2312wf0np -
intel r2312wf0npr -
intel r2312wfqzs -
intel r2312wftzs -
intel r2312wftzsr -
intel s2600stb -
intel s2600stbr -
intel s2600stq -
intel s2600stqr -
intel s2600wf0 -
intel s2600wf0r -
intel s2600wfq -
intel s2600wfqr -
intel s2600wft -
intel s2600wftr -
intel s9232wk1hlc -
intel s9232wk2hac -
intel s9232wk2hlc -
intel s9248wk1hlc -
intel s9248wk2hac -
intel s9248wk2hlc -
intel s9256wk1hlc -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22885F1F-00C7-423B-8B11-A9DB70EE6677",
              "versionEndExcluding": "2.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B49A0E57-126A-4C60-A748-5D357E7B4670",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BB3CD5-DF01-40A8-9906-5C5B306C1B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "263AF100-E101-4FEC-8CB3-8FFDB22B5E27",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3CC4D7-1756-44DB-814D-57106E6826C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECDD9533-1592-465E-B2B3-DB6077782D10",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7819ABC6-800C-4141-A31F-14CBE788EF62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC60590-8707-4B7D-A1D8-188D53F38016",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "106C758A-F23A-48B3-8360-A10212AF50E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F0759F-4583-43CF-AE0B-584A4DDAC633",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E77D-DDB7-41AB-8728-9782336C167B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AAEC7C-3538-4041-A644-515B142F6E8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0431FDBE-4A58-40B1-B635-225E5B9EDBBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86739A74-AE8B-4699-8C1B-AC5D30C4FA50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD891C11-B432-4B87-96BE-7C8BFA76E801",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABE36A4-3F68-4077-A619-743AB1FB92AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E521A2A-B231-4D00-AA1A-92B228B99E4A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1A7612-E617-43DE-826E-DDD7F968CDC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75737EC4-8161-4F09-AD90-7C7E25ACBCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83471545-E7E5-44E7-9967-2F2D808AA866",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FF75DFA-62D9-4CFE-A503-F07A56573CEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F954A5AA-AD4D-4754-8087-DF6ED312DCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50201278-AD47-468E-BA70-900399F2F758",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B062F88-6088-42AF-9B47-ACDEB88A4390",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF6884DD-0C0F-453B-A826-6360C95BD10F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA9657DC-AA1C-4B47-9286-3D7D73F9A714",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "495BFD25-08D3-4DDE-A640-5E7D85AB0560",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C74211C3-3F9D-41E8-AB5B-16205AD90B64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC998F55-2B5C-418D-9B17-23A05C75F454",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C622C8-95E1-4A7F-B3E1-4199310CF4E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D96863-E459-4C0E-B0C8-5207FC3E7962",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F92047-1D58-47E6-89AC-D4434230DB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F422B74A-AF81-4D17-AFEC-E228C5B2023E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3A107D2-6521-4C91-A35D-6E92A5A15A47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9DDFA5-349D-4451-95B1-35ACD8F1D354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B11D98E4-73ED-45D7-A224-E734283585EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "605AD870-F4F5-4159-89BE-9B29D58C04C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure via network access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada insuficiente en el firmware de Intel\u00ae Baseboard Management Controller, puede habilitar a un usuario autenticado para permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso a la red."
    }
  ],
  "id": "CVE-2019-11179",
  "lastModified": "2024-11-21T04:20:40.510",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-14T17:15:14.270",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Impacted products
Vendor Product Version
intel baseboard_management_controller_firmware *
intel bbs2600bpb -
intel bbs2600bpbr -
intel bbs2600bpq -
intel bbs2600bpqr -
intel bbs2600bps -
intel bbs2600bpsr -
intel bbs2600stb -
intel bbs2600stbr -
intel bbs2600stq -
intel bbs2600stqr -
intel hns2600bpb -
intel hns2600bpb24 -
intel hns2600bpb24r -
intel hns2600bpb24rx -
intel hns2600bpblc -
intel hns2600bpblc24 -
intel hns2600bpblc24r -
intel hns2600bpblcr -
intel hns2600bpbr -
intel hns2600bpbrx -
intel hns2600bpq -
intel hns2600bpq24 -
intel hns2600bpq24r -
intel hns2600bpqr -
intel hns2600bps -
intel hns2600bps24 -
intel hns2600bps24r -
intel hns2600bpsr -
intel hpchns2600bpbr -
intel hpchns2600bpqr -
intel hpchns2600bpsr -
intel hpcr1208wfqysr -
intel hpcr1208wftysr -
intel hpcr1304wf0ysr -
intel hpcr1304wftysr -
intel hpcr2208wf0zsr -
intel hpcr2208wfqzsr -
intel hpcr2208wftzsr -
intel hpcr2208wftzsrx -
intel hpcr2224wftzsr -
intel hpcr2308wftzsr -
intel hpcr2312wf0npr -
intel hpcr2312wftzsr -
intel r1208wfqysr -
intel r1208wftys -
intel r1208wftysr -
intel r1304wf0ys -
intel r1304wf0ysr -
intel r1304wftys -
intel r1304wftysr -
intel r2208wf0zs -
intel r2208wf0zsr -
intel r2208wfqzs -
intel r2208wfqzsr -
intel r2208wftzs -
intel r2208wftzsr -
intel r2208wftzsrx -
intel r2224wfqzs -
intel r2224wftzs -
intel r2224wftzsr -
intel r2308wftzs -
intel r2308wftzsr -
intel r2312wf0np -
intel r2312wf0npr -
intel r2312wfqzs -
intel r2312wftzs -
intel r2312wftzsr -
intel s2600stb -
intel s2600stbr -
intel s2600stq -
intel s2600stqr -
intel s2600wf0 -
intel s2600wf0r -
intel s2600wfq -
intel s2600wfqr -
intel s2600wft -
intel s2600wftr -
intel s9232wk1hlc -
intel s9232wk2hac -
intel s9232wk2hlc -
intel s9248wk1hlc -
intel s9248wk2hac -
intel s9248wk2hlc -
intel s9256wk1hlc -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22885F1F-00C7-423B-8B11-A9DB70EE6677",
              "versionEndExcluding": "2.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B49A0E57-126A-4C60-A748-5D357E7B4670",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BB3CD5-DF01-40A8-9906-5C5B306C1B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "263AF100-E101-4FEC-8CB3-8FFDB22B5E27",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3CC4D7-1756-44DB-814D-57106E6826C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECDD9533-1592-465E-B2B3-DB6077782D10",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7819ABC6-800C-4141-A31F-14CBE788EF62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC60590-8707-4B7D-A1D8-188D53F38016",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "106C758A-F23A-48B3-8360-A10212AF50E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F0759F-4583-43CF-AE0B-584A4DDAC633",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E77D-DDB7-41AB-8728-9782336C167B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AAEC7C-3538-4041-A644-515B142F6E8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0431FDBE-4A58-40B1-B635-225E5B9EDBBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86739A74-AE8B-4699-8C1B-AC5D30C4FA50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD891C11-B432-4B87-96BE-7C8BFA76E801",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABE36A4-3F68-4077-A619-743AB1FB92AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E521A2A-B231-4D00-AA1A-92B228B99E4A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1A7612-E617-43DE-826E-DDD7F968CDC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75737EC4-8161-4F09-AD90-7C7E25ACBCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83471545-E7E5-44E7-9967-2F2D808AA866",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FF75DFA-62D9-4CFE-A503-F07A56573CEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F954A5AA-AD4D-4754-8087-DF6ED312DCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50201278-AD47-468E-BA70-900399F2F758",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B062F88-6088-42AF-9B47-ACDEB88A4390",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF6884DD-0C0F-453B-A826-6360C95BD10F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA9657DC-AA1C-4B47-9286-3D7D73F9A714",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "495BFD25-08D3-4DDE-A640-5E7D85AB0560",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C74211C3-3F9D-41E8-AB5B-16205AD90B64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC998F55-2B5C-418D-9B17-23A05C75F454",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C622C8-95E1-4A7F-B3E1-4199310CF4E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D96863-E459-4C0E-B0C8-5207FC3E7962",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F92047-1D58-47E6-89AC-D4434230DB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F422B74A-AF81-4D17-AFEC-E228C5B2023E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3A107D2-6521-4C91-A35D-6E92A5A15A47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9DDFA5-349D-4451-95B1-35ACD8F1D354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B11D98E4-73ED-45D7-A224-E734283585EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "605AD870-F4F5-4159-89BE-9B29D58C04C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable escalation of privilege via network access."
    },
    {
      "lang": "es",
      "value": "Una lectura fuera de l\u00edmite en el firmware de Intel\u00ae Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso a la red."
    }
  ],
  "id": "CVE-2019-11181",
  "lastModified": "2024-11-21T04:20:40.753",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-14T17:15:14.427",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via local access.
Impacted products
Vendor Product Version
intel baseboard_management_controller_firmware *
intel bbs2600bpb -
intel bbs2600bpbr -
intel bbs2600bpq -
intel bbs2600bpqr -
intel bbs2600bps -
intel bbs2600bpsr -
intel bbs2600stb -
intel bbs2600stbr -
intel bbs2600stq -
intel bbs2600stqr -
intel hns2600bpb -
intel hns2600bpb24 -
intel hns2600bpb24r -
intel hns2600bpb24rx -
intel hns2600bpblc -
intel hns2600bpblc24 -
intel hns2600bpblc24r -
intel hns2600bpblcr -
intel hns2600bpbr -
intel hns2600bpbrx -
intel hns2600bpq -
intel hns2600bpq24 -
intel hns2600bpq24r -
intel hns2600bpqr -
intel hns2600bps -
intel hns2600bps24 -
intel hns2600bps24r -
intel hns2600bpsr -
intel hpchns2600bpbr -
intel hpchns2600bpqr -
intel hpchns2600bpsr -
intel hpcr1208wfqysr -
intel hpcr1208wftysr -
intel hpcr1304wf0ysr -
intel hpcr1304wftysr -
intel hpcr2208wf0zsr -
intel hpcr2208wfqzsr -
intel hpcr2208wftzsr -
intel hpcr2208wftzsrx -
intel hpcr2224wftzsr -
intel hpcr2308wftzsr -
intel hpcr2312wf0npr -
intel hpcr2312wftzsr -
intel r1208wfqysr -
intel r1208wftys -
intel r1208wftysr -
intel r1304wf0ys -
intel r1304wf0ysr -
intel r1304wftys -
intel r1304wftysr -
intel r2208wf0zs -
intel r2208wf0zsr -
intel r2208wfqzs -
intel r2208wfqzsr -
intel r2208wftzs -
intel r2208wftzsr -
intel r2208wftzsrx -
intel r2224wfqzs -
intel r2224wftzs -
intel r2224wftzsr -
intel r2308wftzs -
intel r2308wftzsr -
intel r2312wf0np -
intel r2312wf0npr -
intel r2312wfqzs -
intel r2312wftzs -
intel r2312wftzsr -
intel s2600stb -
intel s2600stbr -
intel s2600stq -
intel s2600stqr -
intel s2600wf0 -
intel s2600wf0r -
intel s2600wfq -
intel s2600wfqr -
intel s2600wft -
intel s2600wftr -
intel s9232wk1hlc -
intel s9232wk2hac -
intel s9232wk2hlc -
intel s9248wk1hlc -
intel s9248wk2hac -
intel s9248wk2hlc -
intel s9256wk1hlc -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22885F1F-00C7-423B-8B11-A9DB70EE6677",
              "versionEndExcluding": "2.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B49A0E57-126A-4C60-A748-5D357E7B4670",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BB3CD5-DF01-40A8-9906-5C5B306C1B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "263AF100-E101-4FEC-8CB3-8FFDB22B5E27",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3CC4D7-1756-44DB-814D-57106E6826C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECDD9533-1592-465E-B2B3-DB6077782D10",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7819ABC6-800C-4141-A31F-14CBE788EF62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC60590-8707-4B7D-A1D8-188D53F38016",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "106C758A-F23A-48B3-8360-A10212AF50E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F0759F-4583-43CF-AE0B-584A4DDAC633",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E77D-DDB7-41AB-8728-9782336C167B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AAEC7C-3538-4041-A644-515B142F6E8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0431FDBE-4A58-40B1-B635-225E5B9EDBBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86739A74-AE8B-4699-8C1B-AC5D30C4FA50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD891C11-B432-4B87-96BE-7C8BFA76E801",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABE36A4-3F68-4077-A619-743AB1FB92AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E521A2A-B231-4D00-AA1A-92B228B99E4A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1A7612-E617-43DE-826E-DDD7F968CDC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75737EC4-8161-4F09-AD90-7C7E25ACBCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83471545-E7E5-44E7-9967-2F2D808AA866",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FF75DFA-62D9-4CFE-A503-F07A56573CEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F954A5AA-AD4D-4754-8087-DF6ED312DCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50201278-AD47-468E-BA70-900399F2F758",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B062F88-6088-42AF-9B47-ACDEB88A4390",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF6884DD-0C0F-453B-A826-6360C95BD10F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA9657DC-AA1C-4B47-9286-3D7D73F9A714",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "495BFD25-08D3-4DDE-A640-5E7D85AB0560",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C74211C3-3F9D-41E8-AB5B-16205AD90B64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC998F55-2B5C-418D-9B17-23A05C75F454",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C622C8-95E1-4A7F-B3E1-4199310CF4E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D96863-E459-4C0E-B0C8-5207FC3E7962",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F92047-1D58-47E6-89AC-D4434230DB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F422B74A-AF81-4D17-AFEC-E228C5B2023E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3A107D2-6521-4C91-A35D-6E92A5A15A47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9DDFA5-349D-4451-95B1-35ACD8F1D354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B11D98E4-73ED-45D7-A224-E734283585EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "605AD870-F4F5-4159-89BE-9B29D58C04C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de sesi\u00f3n insuficiente en el firmware de Intel\u00ae Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n y/o una denegaci\u00f3n de servicio por medio de un acceso local."
    }
  ],
  "id": "CVE-2019-11173",
  "lastModified": "2024-11-21T04:20:39.907",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-14T17:15:13.943",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Insufficient access control in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access.
Impacted products
Vendor Product Version
intel baseboard_management_controller_firmware *
intel bbs2600bpb -
intel bbs2600bpbr -
intel bbs2600bpq -
intel bbs2600bpqr -
intel bbs2600bps -
intel bbs2600bpsr -
intel bbs2600stb -
intel bbs2600stbr -
intel bbs2600stq -
intel bbs2600stqr -
intel hns2600bpb -
intel hns2600bpb24 -
intel hns2600bpb24r -
intel hns2600bpb24rx -
intel hns2600bpblc -
intel hns2600bpblc24 -
intel hns2600bpblc24r -
intel hns2600bpblcr -
intel hns2600bpbr -
intel hns2600bpbrx -
intel hns2600bpq -
intel hns2600bpq24 -
intel hns2600bpq24r -
intel hns2600bpqr -
intel hns2600bps -
intel hns2600bps24 -
intel hns2600bps24r -
intel hns2600bpsr -
intel hpchns2600bpbr -
intel hpchns2600bpqr -
intel hpchns2600bpsr -
intel hpcr1208wfqysr -
intel hpcr1208wftysr -
intel hpcr1304wf0ysr -
intel hpcr1304wftysr -
intel hpcr2208wf0zsr -
intel hpcr2208wfqzsr -
intel hpcr2208wftzsr -
intel hpcr2208wftzsrx -
intel hpcr2224wftzsr -
intel hpcr2308wftzsr -
intel hpcr2312wf0npr -
intel hpcr2312wftzsr -
intel r1208wfqysr -
intel r1208wftys -
intel r1208wftysr -
intel r1304wf0ys -
intel r1304wf0ysr -
intel r1304wftys -
intel r1304wftysr -
intel r2208wf0zs -
intel r2208wf0zsr -
intel r2208wfqzs -
intel r2208wfqzsr -
intel r2208wftzs -
intel r2208wftzsr -
intel r2208wftzsrx -
intel r2224wfqzs -
intel r2224wftzs -
intel r2224wftzsr -
intel r2308wftzs -
intel r2308wftzsr -
intel r2312wf0np -
intel r2312wf0npr -
intel r2312wfqzs -
intel r2312wftzs -
intel r2312wftzsr -
intel s2600stb -
intel s2600stbr -
intel s2600stq -
intel s2600stqr -
intel s2600wf0 -
intel s2600wf0r -
intel s2600wfq -
intel s2600wfqr -
intel s2600wft -
intel s2600wftr -
intel s9232wk1hlc -
intel s9232wk2hac -
intel s9232wk2hlc -
intel s9248wk1hlc -
intel s9248wk2hac -
intel s9248wk2hlc -
intel s9256wk1hlc -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22885F1F-00C7-423B-8B11-A9DB70EE6677",
              "versionEndExcluding": "2.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B49A0E57-126A-4C60-A748-5D357E7B4670",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BB3CD5-DF01-40A8-9906-5C5B306C1B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "263AF100-E101-4FEC-8CB3-8FFDB22B5E27",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3CC4D7-1756-44DB-814D-57106E6826C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECDD9533-1592-465E-B2B3-DB6077782D10",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7819ABC6-800C-4141-A31F-14CBE788EF62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC60590-8707-4B7D-A1D8-188D53F38016",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "106C758A-F23A-48B3-8360-A10212AF50E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F0759F-4583-43CF-AE0B-584A4DDAC633",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E77D-DDB7-41AB-8728-9782336C167B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AAEC7C-3538-4041-A644-515B142F6E8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0431FDBE-4A58-40B1-B635-225E5B9EDBBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86739A74-AE8B-4699-8C1B-AC5D30C4FA50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD891C11-B432-4B87-96BE-7C8BFA76E801",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABE36A4-3F68-4077-A619-743AB1FB92AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E521A2A-B231-4D00-AA1A-92B228B99E4A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1A7612-E617-43DE-826E-DDD7F968CDC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75737EC4-8161-4F09-AD90-7C7E25ACBCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83471545-E7E5-44E7-9967-2F2D808AA866",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FF75DFA-62D9-4CFE-A503-F07A56573CEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F954A5AA-AD4D-4754-8087-DF6ED312DCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50201278-AD47-468E-BA70-900399F2F758",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B062F88-6088-42AF-9B47-ACDEB88A4390",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF6884DD-0C0F-453B-A826-6360C95BD10F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA9657DC-AA1C-4B47-9286-3D7D73F9A714",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "495BFD25-08D3-4DDE-A640-5E7D85AB0560",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C74211C3-3F9D-41E8-AB5B-16205AD90B64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC998F55-2B5C-418D-9B17-23A05C75F454",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C622C8-95E1-4A7F-B3E1-4199310CF4E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D96863-E459-4C0E-B0C8-5207FC3E7962",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F92047-1D58-47E6-89AC-D4434230DB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F422B74A-AF81-4D17-AFEC-E228C5B2023E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3A107D2-6521-4C91-A35D-6E92A5A15A47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9DDFA5-349D-4451-95B1-35ACD8F1D354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B11D98E4-73ED-45D7-A224-E734283585EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "605AD870-F4F5-4159-89BE-9B29D58C04C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient access control in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso insuficiente en el firmware de Intel\u00ae Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso a la red."
    }
  ],
  "id": "CVE-2019-11174",
  "lastModified": "2024-11-21T04:20:40.020",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-14T17:15:14.007",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-09-12 19:29
Modified
2024-11-21 03:44
Severity ?
Summary
Privilege escalation in Intel Baseboard Management Controller (BMC) firmware before version 1.43.91f76955 may allow an unprivileged user to potentially execute arbitrary code or perform denial of service over the network.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:bmc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B3F541B-3A23-4DD1-829D-2CF8A9698EDE",
              "versionEndExcluding": "1.43.91f76955",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B49A0E57-126A-4C60-A748-5D357E7B4670",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BB3CD5-DF01-40A8-9906-5C5B306C1B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3CC4D7-1756-44DB-814D-57106E6826C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7819ABC6-800C-4141-A31F-14CBE788EF62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "106C758A-F23A-48B3-8360-A10212AF50E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CDAD0D9-C4DD-42B5-AC7F-4C53F406B762",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Privilege escalation in Intel Baseboard Management Controller (BMC) firmware before version 1.43.91f76955 may allow an unprivileged user to potentially execute arbitrary code or perform denial of service over the network."
    },
    {
      "lang": "es",
      "value": "Escalado de privilegios en el firmware de Intel Baseboard Management Controller (BMC) en versiones anteriores a la 1.43.91f76955 podr\u00eda permitir que un usuario sin privilegios ejecute c\u00f3digo arbitrario o realice una denegaci\u00f3n de servicio (DoS) en la red."
    }
  ],
  "id": "CVE-2018-12171",
  "lastModified": "2024-11-21T03:44:41.537",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-09-12T19:29:01.980",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00149.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00149.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-02-19 16:15
Modified
2024-11-21 04:59
Summary
Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow a privileged user to potentially enable escalation of privilege via local access.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:bmc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "15CF9AD6-8F14-40FC-8657-8BC57B595ED2",
              "versionEndExcluding": "2.47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E77D-DDB7-41AB-8728-9782336C167B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0431FDBE-4A58-40B1-B635-225E5B9EDBBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86739A74-AE8B-4699-8C1B-AC5D30C4FA50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD891C11-B432-4B87-96BE-7C8BFA76E801",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1000wf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D5E07CC-3948-4664-AE8E-0517D9D66211",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68606D69-C913-492A-A00E-3D899AB42595",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D292D7D-1E22-440F-B30C-3C580AFE91C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C89B4E6B-B742-4BCA-9547-B1C6059C6671",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en el firmware de BMC para algunas Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 2.47, puede permitir a un usuario con privilegios habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-12374",
  "lastModified": "2024-11-21T04:59:36.197",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-02-19T16:15:12.657",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-14 17:15
Modified
2024-11-21 04:20
Summary
Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.
Impacted products
Vendor Product Version
intel baseboard_management_controller_firmware *
intel bbs2600bpb -
intel bbs2600bpbr -
intel bbs2600bpq -
intel bbs2600bpqr -
intel bbs2600bps -
intel bbs2600bpsr -
intel bbs2600stb -
intel bbs2600stbr -
intel bbs2600stq -
intel bbs2600stqr -
intel hns2600bpb -
intel hns2600bpb24 -
intel hns2600bpb24r -
intel hns2600bpb24rx -
intel hns2600bpblc -
intel hns2600bpblc24 -
intel hns2600bpblc24r -
intel hns2600bpblcr -
intel hns2600bpbr -
intel hns2600bpbrx -
intel hns2600bpq -
intel hns2600bpq24 -
intel hns2600bpq24r -
intel hns2600bpqr -
intel hns2600bps -
intel hns2600bps24 -
intel hns2600bps24r -
intel hns2600bpsr -
intel hpchns2600bpbr -
intel hpchns2600bpqr -
intel hpchns2600bpsr -
intel hpcr1208wfqysr -
intel hpcr1208wftysr -
intel hpcr1304wf0ysr -
intel hpcr1304wftysr -
intel hpcr2208wf0zsr -
intel hpcr2208wfqzsr -
intel hpcr2208wftzsr -
intel hpcr2208wftzsrx -
intel hpcr2224wftzsr -
intel hpcr2308wftzsr -
intel hpcr2312wf0npr -
intel hpcr2312wftzsr -
intel r1208wfqysr -
intel r1208wftys -
intel r1208wftysr -
intel r1304wf0ys -
intel r1304wf0ysr -
intel r1304wftys -
intel r1304wftysr -
intel r2208wf0zs -
intel r2208wf0zsr -
intel r2208wfqzs -
intel r2208wfqzsr -
intel r2208wftzs -
intel r2208wftzsr -
intel r2208wftzsrx -
intel r2224wfqzs -
intel r2224wftzs -
intel r2224wftzsr -
intel r2308wftzs -
intel r2308wftzsr -
intel r2312wf0np -
intel r2312wf0npr -
intel r2312wfqzs -
intel r2312wftzs -
intel r2312wftzsr -
intel s2600stb -
intel s2600stbr -
intel s2600stq -
intel s2600stqr -
intel s2600wf0 -
intel s2600wf0r -
intel s2600wfq -
intel s2600wfqr -
intel s2600wft -
intel s2600wftr -
intel s9232wk1hlc -
intel s9232wk2hac -
intel s9232wk2hlc -
intel s9248wk1hlc -
intel s9248wk2hac -
intel s9248wk2hlc -
intel s9256wk1hlc -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22885F1F-00C7-423B-8B11-A9DB70EE6677",
              "versionEndExcluding": "2.18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B49A0E57-126A-4C60-A748-5D357E7B4670",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE87A7F1-AEE2-47AF-A69F-B85C0DC4D4F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34BB3CD5-DF01-40A8-9906-5C5B306C1B85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "263AF100-E101-4FEC-8CB3-8FFDB22B5E27",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B3CC4D7-1756-44DB-814D-57106E6826C6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECDD9533-1592-465E-B2B3-DB6077782D10",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7819ABC6-800C-4141-A31F-14CBE788EF62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC60590-8707-4B7D-A1D8-188D53F38016",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "106C758A-F23A-48B3-8360-A10212AF50E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9F0759F-4583-43CF-AE0B-584A4DDAC633",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F08CC45-9AC9-4A00-83B9-F9D4970B0DE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F002684-C456-40F0-AA2A-97C79AE5EECA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4E1CD8-2A13-4BC9-87D9-24E9E0897500",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFF16FE0-6AA8-4F23-BCFC-43AD3DB3CA35",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "796E437A-B972-4D30-B0A4-53366693C7DF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D9CC284-540E-492A-A0E6-A193DEAD3102",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CC9E77D-DDB7-41AB-8728-9782336C167B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19AAEC7C-3538-4041-A644-515B142F6E8D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE6E2091-967D-4BA1-B190-9A2D13FE4AFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1EA0A02-732D-46DC-88B3-8B3D29FDC69B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24786B0E-36AC-4DBD-8778-DC836CF81CB1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "613CDC12-2D3E-4BF3-AE2D-DCDEBEAED03D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0431FDBE-4A58-40B1-B635-225E5B9EDBBB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7138CA16-5DDA-4CAB-AF4F-6B4127C1055F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9EADDC0-0AAE-4445-9764-1C54E3898FFD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E09B1290-FAD0-4869-A1FA-A4D12BB602CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86739A74-AE8B-4699-8C1B-AC5D30C4FA50",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD891C11-B432-4B87-96BE-7C8BFA76E801",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FABE36A4-3F68-4077-A619-743AB1FB92AC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E521A2A-B231-4D00-AA1A-92B228B99E4A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1A7612-E617-43DE-826E-DDD7F968CDC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75737EC4-8161-4F09-AD90-7C7E25ACBCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83471545-E7E5-44E7-9967-2F2D808AA866",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "857AF7AC-6368-4632-8DDB-9A5A18CB2E7A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FF75DFA-62D9-4CFE-A503-F07A56573CEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0063DE-78A8-49CC-AE3D-8B23F514AEF0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F954A5AA-AD4D-4754-8087-DF6ED312DCBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50201278-AD47-468E-BA70-900399F2F758",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E99780-55F9-4CC5-ACEB-4A8C7DCB7262",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E5909FF-C3FE-4453-9BEA-CB2C1AF67765",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B062F88-6088-42AF-9B47-ACDEB88A4390",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF6884DD-0C0F-453B-A826-6360C95BD10F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB2F397-841E-4CCA-A2C5-D53FB9875FE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85763067-E9E5-4418-A51F-FF3DD3710F9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1DD69C7-9E7C-4569-9971-A06F77028BB7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3506908A-8081-4ADA-A986-E02415956AB4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DEF6206-E94C-4C16-8D91-AD776D62F79F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1E6AFA4-49E7-4191-9EA2-7E2EE269067B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A47AC30-315C-4E4B-BBBB-305FA5131281",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48054F35-53C1-4480-86E2-CB8260DD84B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF575955-C7E1-4DD6-8AAE-5930EDFEDA93",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8029A5F9-E999-4BA9-AA77-14A73B83454E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83196F-06BD-41D6-A6B8-C7ABD25CA238",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07C54A6D-7193-4AC3-A1E5-3CE16DF54FCB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30E49457-D38D-4145-81F2-7FA4D463CD24",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB1E675-B059-4F28-8EBA-9FA5EF6E4044",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17B4BCA5-E552-4CAA-B2A7-0A311D7A6D49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C6540A-C5E4-46E5-BB7C-E4C53904AE68",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D952C1D5-581F-4ADC-8DB5-3682DC8588CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D6DFA67-F1EE-4DBB-8E7B-CCDF097DC8BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EF6A93-7FDE-43A7-BB5D-1DD52318F60D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3183B56-D5BB-4010-B2EE-3427D796D2A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98B6DF59-DF1E-4D9C-B574-37DC398B16AB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "931E4D81-FAF0-4BFF-92E0-D5F653C5E845",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6982CB5F-4448-48D4-BD3A-782874AB2304",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B14E3D1D-B614-458D-8F78-E25CC89B311E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81818501-4F4A-4CED-895D-84D6DC139811",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A08E8AD9-CA53-4F39-820E-D4A4D2D319EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA9657DC-AA1C-4B47-9286-3D7D73F9A714",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DDFAF1C-E386-4F35-8A81-492713F10A92",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "495BFD25-08D3-4DDE-A640-5E7D85AB0560",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D8B99E9-63EF-45FA-AD23-1CEBDB3DD41E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C74211C3-3F9D-41E8-AB5B-16205AD90B64",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F105271A-9DC1-42CE-9D19-E4A55BE1F04E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC998F55-2B5C-418D-9B17-23A05C75F454",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4BEA962-CEFF-429C-BB64-1C3FEA98FCE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C622C8-95E1-4A7F-B3E1-4199310CF4E8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94D96863-E459-4C0E-B0C8-5207FC3E7962",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86F92047-1D58-47E6-89AC-D4434230DB66",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F422B74A-AF81-4D17-AFEC-E228C5B2023E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3A107D2-6521-4C91-A35D-6E92A5A15A47",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C9DDFA5-349D-4451-95B1-35ACD8F1D354",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B11D98E4-73ED-45D7-A224-E734283585EA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "605AD870-F4F5-4159-89BE-9B29D58C04C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada insuficiente en el firmware de Intel\u00ae Baseboard Management Controller, puede habilitar a un usuario no autenticado para permitir potencialmente una denegaci\u00f3n de servicio por medio de un acceso a la red."
    }
  ],
  "id": "CVE-2019-11180",
  "lastModified": "2024-11-21T04:20:40.630",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-14T17:15:14.333",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2019-11172
Vulnerability from cvelistv5
Published
2019-11-14 16:36
Modified
2024-08-04 22:48
Severity ?
Summary
Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access.
Impacted products
Vendor Product Version
n/a Intel(R) BMC Version: See provided reference
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:48:08.660Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) BMC",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-14T16:36:45",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-11172",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) BMC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-11172",
    "datePublished": "2019-11-14T16:36:45",
    "dateReserved": "2019-04-11T00:00:00",
    "dateUpdated": "2024-08-04T22:48:08.660Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-11179
Vulnerability from cvelistv5
Published
2019-11-14 16:38
Modified
2024-08-04 22:48
Severity ?
Summary
Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure via network access.
Impacted products
Vendor Product Version
n/a Intel(R) BMC Version: See provided reference
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:48:08.997Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) BMC",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure via network access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-14T16:38:07",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-11179",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) BMC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure via network access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-11179",
    "datePublished": "2019-11-14T16:38:07",
    "dateReserved": "2019-04-11T00:00:00",
    "dateUpdated": "2024-08-04T22:48:08.997Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-11177
Vulnerability from cvelistv5
Published
2019-11-14 16:37
Modified
2024-08-04 22:48
Severity ?
Summary
Unhandled exception in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.
Impacted products
Vendor Product Version
n/a Intel(R) BMC Version: See provided reference
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:48:08.990Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) BMC",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Unhandled exception in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-14T16:37:36",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-11177",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) BMC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unhandled exception in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-11177",
    "datePublished": "2019-11-14T16:37:36",
    "dateReserved": "2019-04-11T00:00:00",
    "dateUpdated": "2024-08-04T22:48:08.990Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12374
Vulnerability from cvelistv5
Published
2021-02-19 15:17
Modified
2024-08-04 11:56
Severity ?
Summary
Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
n/a Intel(R) Server Boards, Server Systems and Compute Modules Version: before version 2.47
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:56:51.655Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 2.47"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-02-19T15:17:24",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-12374",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 2.47"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "escalation of privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-12374",
    "datePublished": "2021-02-19T15:17:24",
    "dateReserved": "2020-04-28T00:00:00",
    "dateUpdated": "2024-08-04T11:56:51.655Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-11171
Vulnerability from cvelistv5
Published
2019-11-14 16:36
Modified
2024-08-04 22:48
Severity ?
Summary
Heap corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via network access.
Impacted products
Vendor Product Version
n/a Intel(R) BMC Version: See provided reference
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:48:08.681Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) BMC",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via network access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege, Denial of Service, Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-14T16:36:30",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-11171",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) BMC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via network access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege, Denial of Service, Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-11171",
    "datePublished": "2019-11-14T16:36:30",
    "dateReserved": "2019-04-11T00:00:00",
    "dateUpdated": "2024-08-04T22:48:08.681Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-11180
Vulnerability from cvelistv5
Published
2019-11-14 16:38
Modified
2024-08-04 22:48
Severity ?
Summary
Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.
Impacted products
Vendor Product Version
n/a Intel(R) BMC Version: See provided reference
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:48:08.317Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) BMC",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-14T16:38:15",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-11180",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) BMC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-11180",
    "datePublished": "2019-11-14T16:38:15",
    "dateReserved": "2019-04-11T00:00:00",
    "dateUpdated": "2024-08-04T22:48:08.317Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12373
Vulnerability from cvelistv5
Published
2021-02-17 13:54
Modified
2024-08-04 11:56
Severity ?
Summary
Expired pointer dereference in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable a denial of service via local access.
Impacted products
Vendor Product Version
n/a Intel(R) Graphics Drivers Version: before version 26.20.100.8141
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:56:51.773Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Graphics Drivers",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 26.20.100.8141"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Expired pointer dereference in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable a denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-02-19T15:21:10",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-12373",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Graphics Drivers",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 26.20.100.8141"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Expired pointer dereference in some Intel(R) Graphics Drivers before version 26.20.100.8141 may allow a privileged user to potentially enable a denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "denial of service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00438.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-12373",
    "datePublished": "2021-02-17T13:54:04",
    "dateReserved": "2020-04-28T00:00:00",
    "dateUpdated": "2024-08-04T11:56:51.773Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12377
Vulnerability from cvelistv5
Published
2021-02-17 13:55
Modified
2024-08-04 11:56
Severity ?
Summary
Insufficient input validation in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
n/a Intel(R) Server Boards, Server Systems and Compute Modules Version: before version 2.47
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:56:51.330Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 2.47"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient input validation in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-02-17T13:55:37",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-12377",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 2.47"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient input validation in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "escalation of privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-12377",
    "datePublished": "2021-02-17T13:55:37",
    "dateReserved": "2020-04-28T00:00:00",
    "dateUpdated": "2024-08-04T11:56:51.330Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12380
Vulnerability from cvelistv5
Published
2021-02-17 13:55
Modified
2024-08-04 11:56
Severity ?
Summary
Out of bounds read in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
n/a Intel(R) Server Boards, Server Systems and Compute Modules Version: before version 2.47
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:56:52.041Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 2.47"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of bounds read in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-02-17T13:55:53",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-12380",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 2.47"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out of bounds read in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "escalation of privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-12380",
    "datePublished": "2021-02-17T13:55:53",
    "dateReserved": "2020-04-28T00:00:00",
    "dateUpdated": "2024-08-04T11:56:52.041Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-11173
Vulnerability from cvelistv5
Published
2019-11-14 16:37
Modified
2024-08-04 22:48
Severity ?
Summary
Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via local access.
Impacted products
Vendor Product Version
n/a Intel(R) BMC Version: See provided reference
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:48:08.971Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) BMC",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service, Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-14T16:37:00",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-11173",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) BMC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service, Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-11173",
    "datePublished": "2019-11-14T16:37:00",
    "dateReserved": "2019-04-11T00:00:00",
    "dateUpdated": "2024-08-04T22:48:08.971Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12376
Vulnerability from cvelistv5
Published
2021-02-17 13:56
Modified
2024-08-04 11:56
Severity ?
Summary
Use of hard-coded key in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow authenticated user to potentially enable information disclosure via local access.
Impacted products
Vendor Product Version
n/a Intel(R) Server Boards, Server Systems and Compute Modules Version: before version 2.47
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:56:51.809Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 2.47"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Use of hard-coded key in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow authenticated user to potentially enable information disclosure via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "information disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-02-17T13:56:08",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-12376",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 2.47"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Use of hard-coded key in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow authenticated user to potentially enable information disclosure via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "information disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-12376",
    "datePublished": "2021-02-17T13:56:08",
    "dateReserved": "2020-04-28T00:00:00",
    "dateUpdated": "2024-08-04T11:56:51.809Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-11178
Vulnerability from cvelistv5
Published
2019-11-14 16:37
Modified
2024-08-04 22:48
Severity ?
Summary
Stack overflow in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure and/or denial of service via network access.
Impacted products
Vendor Product Version
n/a Intel(R) BMC Version: See provided reference
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:48:08.984Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) BMC",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack overflow in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure and/or denial of service via network access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service, Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-14T16:37:44",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-11178",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) BMC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack overflow in Intel(R) Baseboard Management Controller firmware may allow an authenticated user to potentially enable information disclosure and/or denial of service via network access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service, Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-11178",
    "datePublished": "2019-11-14T16:37:44",
    "dateReserved": "2019-04-11T00:00:00",
    "dateUpdated": "2024-08-04T22:48:08.984Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-11182
Vulnerability from cvelistv5
Published
2019-11-14 16:38
Modified
2024-08-04 22:48
Severity ?
Summary
Memory corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.
Impacted products
Vendor Product Version
n/a Intel(R) BMC Version: See provided reference
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:48:08.986Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) BMC",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Memory corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-14T16:38:31",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-11182",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) BMC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Memory corruption in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-11182",
    "datePublished": "2019-11-14T16:38:31",
    "dateReserved": "2019-04-11T00:00:00",
    "dateUpdated": "2024-08-04T22:48:08.986Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-12171
Vulnerability from cvelistv5
Published
2018-09-12 19:00
Modified
2024-09-16 20:02
Severity ?
Summary
Privilege escalation in Intel Baseboard Management Controller (BMC) firmware before version 1.43.91f76955 may allow an unprivileged user to potentially execute arbitrary code or perform denial of service over the network.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T08:30:58.489Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00149.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Baseboard Management Controller (BMC) firmware",
          "vendor": "Intel Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "Versions before 1.43.91f76955."
            }
          ]
        }
      ],
      "datePublic": "2018-09-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Privilege escalation in Intel Baseboard Management Controller (BMC) firmware before version 1.43.91f76955 may allow an unprivileged user to potentially execute arbitrary code or perform denial of service over the network."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege, Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-09-12T18:57:01",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00149.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "DATE_PUBLIC": "2018-09-11T00:00:00",
          "ID": "CVE-2018-12171",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Baseboard Management Controller (BMC) firmware",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Versions before 1.43.91f76955."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Intel Corporation"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Privilege escalation in Intel Baseboard Management Controller (BMC) firmware before version 1.43.91f76955 may allow an unprivileged user to potentially execute arbitrary code or perform denial of service over the network."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege, Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00149.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00149.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2018-12171",
    "datePublished": "2018-09-12T19:00:00Z",
    "dateReserved": "2018-06-11T00:00:00",
    "dateUpdated": "2024-09-16T20:02:17.695Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-11168
Vulnerability from cvelistv5
Published
2019-11-14 16:35
Modified
2024-08-04 22:48
Severity ?
Summary
Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access.
Impacted products
Vendor Product Version
n/a Intel(R) BMC Version: See provided reference
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:48:09.015Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.f5.com/csp/article/K64346530?utm_source=f5support\u0026amp%3Butm_medium=RSS"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) BMC",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege, Denial of Service, Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-15T21:06:51",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.f5.com/csp/article/K64346530?utm_source=f5support\u0026amp%3Butm_medium=RSS"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-11168",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) BMC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient session validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure and/or denial of service via network access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege, Denial of Service, Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
            },
            {
              "name": "https://support.f5.com/csp/article/K64346530?utm_source=f5support\u0026amp;utm_medium=RSS",
              "refsource": "CONFIRM",
              "url": "https://support.f5.com/csp/article/K64346530?utm_source=f5support\u0026amp;utm_medium=RSS"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-11168",
    "datePublished": "2019-11-14T16:35:58",
    "dateReserved": "2019-04-11T00:00:00",
    "dateUpdated": "2024-08-04T22:48:09.015Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-12375
Vulnerability from cvelistv5
Published
2021-02-17 13:56
Modified
2024-08-04 11:56
Severity ?
Summary
Heap overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
n/a Intel(R) Server Boards, Server Systems and Compute Modules Version: before version 2.47
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:56:51.788Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 2.47"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-02-17T13:56:01",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-12375",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 2.47"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "escalation of privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-12375",
    "datePublished": "2021-02-17T13:56:01",
    "dateReserved": "2020-04-28T00:00:00",
    "dateUpdated": "2024-08-04T11:56:51.788Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-3682
Vulnerability from cvelistv5
Published
2018-07-10 21:00
Modified
2024-08-05 04:50
Severity ?
Summary
BMC Firmware in Intel server boards, compute modules, and systems potentially allow an attacker with administrative privileges to make unauthorized read\writes to the SMBUS.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T04:50:30.421Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00130.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel Server Boards, Compute Modules and Systems",
          "vendor": "Intel Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "BMC Equipped"
            }
          ]
        }
      ],
      "datePublic": "2018-07-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "BMC Firmware in Intel server boards, compute modules, and systems potentially allow an attacker with administrative privileges to make unauthorized read\\writes to the SMBUS."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-10T20:57:01",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00130.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2018-3682",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel Server Boards, Compute Modules and Systems",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "BMC Equipped"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Intel Corporation"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "BMC Firmware in Intel server boards, compute modules, and systems potentially allow an attacker with administrative privileges to make unauthorized read\\writes to the SMBUS."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00130.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00130.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2018-3682",
    "datePublished": "2018-07-10T21:00:00",
    "dateReserved": "2017-12-28T00:00:00",
    "dateUpdated": "2024-08-05T04:50:30.421Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-11174
Vulnerability from cvelistv5
Published
2019-11-14 16:37
Modified
2024-08-04 22:48
Severity ?
Summary
Insufficient access control in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access.
Impacted products
Vendor Product Version
n/a Intel(R) BMC Version: See provided reference
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:48:08.697Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) BMC",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient access control in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-14T16:37:10",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-11174",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) BMC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient access control in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure via network access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-11174",
    "datePublished": "2019-11-14T16:37:10",
    "dateReserved": "2019-04-11T00:00:00",
    "dateUpdated": "2024-08-04T22:48:08.697Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-12204
Vulnerability from cvelistv5
Published
2019-03-14 20:00
Modified
2024-09-16 23:42
Severity ?
Summary
Improper memory initialization in Platform Sample/Silicon Reference firmware Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow privileged user to potentially enable an escalation of privilege via local access.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T08:30:59.236Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20190318-0002/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03929en_us"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03978en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel Platform Sample / Silicon Reference firmware",
          "vendor": "Intel Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "Multiple versions."
            }
          ]
        }
      ],
      "datePublic": "2019-03-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper memory initialization in Platform Sample/Silicon Reference firmware Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow privileged user to potentially enable an escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-01-16T03:06:03",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20190318-0002/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03929en_us"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03978en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "DATE_PUBLIC": "2019-03-12T00:00:00",
          "ID": "CVE-2018-12204",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel Platform Sample / Silicon Reference firmware",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Multiple versions."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Intel Corporation"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper memory initialization in Platform Sample/Silicon Reference firmware Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow privileged user to potentially enable an escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html",
              "refsource": "CONFIRM",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20190318-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20190318-0002/"
            },
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us",
              "refsource": "CONFIRM",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
            },
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03929en_us",
              "refsource": "CONFIRM",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03929en_us"
            },
            {
              "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03978en_us",
              "refsource": "CONFIRM",
              "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03978en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2018-12204",
    "datePublished": "2019-03-14T20:00:00Z",
    "dateReserved": "2018-06-11T00:00:00",
    "dateUpdated": "2024-09-16T23:42:04.799Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-11175
Vulnerability from cvelistv5
Published
2019-11-14 16:37
Modified
2024-08-04 22:48
Severity ?
Summary
Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.
Impacted products
Vendor Product Version
n/a Intel(R) BMC Version: See provided reference
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:48:08.961Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) BMC",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-14T16:37:26",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-11175",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) BMC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-11175",
    "datePublished": "2019-11-14T16:37:26",
    "dateReserved": "2019-04-11T00:00:00",
    "dateUpdated": "2024-08-04T22:48:08.961Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-11181
Vulnerability from cvelistv5
Published
2019-11-14 16:38
Modified
2024-08-04 22:48
Severity ?
Summary
Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable escalation of privilege via network access.
Impacted products
Vendor Product Version
n/a Intel(R) BMC Version: See provided reference
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:48:08.908Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) BMC",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable escalation of privilege via network access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-14T16:38:23",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-11181",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) BMC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out of bound read in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable escalation of privilege via network access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-11181",
    "datePublished": "2019-11-14T16:38:23",
    "dateReserved": "2019-04-11T00:00:00",
    "dateUpdated": "2024-08-04T22:48:08.908Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-0119
Vulnerability from cvelistv5
Published
2019-05-17 15:41
Modified
2024-08-04 17:44
Severity ?
Summary
Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access.
Impacted products
Vendor Product Version
n/a Intel(R) Unified Extensible Firmware Interface (UEFI) Version: Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T17:44:14.602Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html"
          },
          {
            "name": "108485",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/108485"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.f5.com/csp/article/K85585101"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Unified Extensible Firmware Interface (UEFI)",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module."
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege, Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-06-06T19:06:02",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html"
        },
        {
          "name": "108485",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/108485"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.f5.com/csp/article/K85585101"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-0119",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Unified Extensible Firmware Interface (UEFI)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege, Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html"
            },
            {
              "name": "108485",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/108485"
            },
            {
              "name": "https://support.f5.com/csp/article/K85585101",
              "refsource": "CONFIRM",
              "url": "https://support.f5.com/csp/article/K85585101"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-0119",
    "datePublished": "2019-05-17T15:41:38",
    "dateReserved": "2018-11-13T00:00:00",
    "dateUpdated": "2024-08-04T17:44:14.602Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-11170
Vulnerability from cvelistv5
Published
2019-11-14 16:36
Modified
2024-08-04 22:48
Severity ?
Summary
Authentication bypass in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via local access.
Impacted products
Vendor Product Version
n/a Intel(R) BMC Version: See provided reference
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T22:48:08.893Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) BMC",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "See provided reference"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Authentication bypass in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege, Denial of Service, Information Disclosure",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-11-14T16:36:15",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2019-11170",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) BMC",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "See provided reference"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Authentication bypass in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable information disclosure, escalation of privilege and/or denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege, Denial of Service, Information Disclosure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00313.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2019-11170",
    "datePublished": "2019-11-14T16:36:15",
    "dateReserved": "2019-04-11T00:00:00",
    "dateUpdated": "2024-08-04T22:48:08.893Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

var-201905-0867
Vulnerability from variot

Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. plural Intel The product contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Unified Extensible Firmware Interface is prone to multiple security vulnerabilities. Attackers can leverage these issues to gain elevated privileges and execute arbitrary code to cause denial-of-service conditions on the affected device. Intel Server Board, etc. are all products of Intel Corporation of the United States. Intel Server Board is a server motherboard. Intel Xeon Scalable Processors are a scalable server central processing unit (CPU). Intel Xeon Processor D Family is a Xeon D series server central processing unit (CPU). A buffer overflow vulnerability exists in the system firmware of several Intel products. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. A local attacker could exploit this vulnerability to elevate a new server and/or cause a denial of service

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201905-0867",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "xeon gold processors",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600bps24",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2142it",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600jfq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1567",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600bpq24",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2123it",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "server board s2600st",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1622",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1571",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600tpf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1623n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2400lp",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1518",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1521",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1533n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1523n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "server board s2600bp",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600tp24sr",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1540",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2183it",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2191",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon bronze processors",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "server board s1200sp",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600tp",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600kpfr",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1602",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600wpq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2146nt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1531",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1627",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "server board s2600kp",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2187nt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1520",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1541",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "mfs5520vir",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "server board s2600tp",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600jf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1633n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1637",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "server board s2600wt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "server board s7200ap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1543n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1548",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1513n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1529",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "mfs2600ki",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2166nt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "server board s2600cw",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600tpr",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600tpfr",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600bpblc",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1653n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1539",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1577",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "mfs5000si",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1537",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600bpblc24",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns7200aprl",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600tpnr",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2145nt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "server system s9200wk",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "server board s2600wf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600bpb",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1557",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600wpf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon silver processors",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns7200apr",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2141i",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1649n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2163it",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1559",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600kp",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1527",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns7200apl",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2161i",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600wp",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600jff",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600tp24str",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon platinum processors",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600kpf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600kpr",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2143it",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600bpb24",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600bpq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1528",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2177nt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns7200ap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600bps",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2173it",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1553n",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "hns2600tp24r",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "acu wizard",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "active management technology",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "converged security management engine",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "driver and support assistant",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "dynamic application loader",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "i915",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "nuc board nuc7i7dnbe",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "nuc kit nuc7i5dnhe",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "nuc kit nuc7i7dnhe",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "nuc kit nuc7i7dnke",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "nuc kit nuc8i7hnk",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "nuc kit nuc8i7hvk",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "proset/wireless software driver",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "quartus ii programmer and tools",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "server platform services",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "trusted execution engine",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "intel",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "quartus prime",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "scs discovery utility",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "unite client",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "graphics driver",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1602",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1622",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1623n",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1627",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1633n",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1637",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1649n",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-1653n",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2141i",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon d-2177nt",
        "scope": null,
        "trust": 0.8,
        "vendor": "intel",
        "version": null
      },
      {
        "model": "xeon scalable processors",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "0"
      },
      {
        "model": "xeon d processor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "0"
      },
      {
        "model": "pentium silver processor series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "0"
      },
      {
        "model": "pentium processor n series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "0"
      },
      {
        "model": "pentium processor j series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "0"
      },
      {
        "model": "compute module",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "0"
      },
      {
        "model": "celeron processor n series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "0"
      },
      {
        "model": "celeron processor j series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "0"
      },
      {
        "model": "atom processor e3900 series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "0"
      },
      {
        "model": "atom processor a series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "intel",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "108485"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003441"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-004739"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-0119"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:intel:acu_wizard",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:intel:active_management_technology_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:intel:converged_security_management_engine_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:intel:driver_%26_support_assistant",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:intel:dynamic_application_loader",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:intel:i915_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:intel:boardnuc7i7dnbe",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:intel:nuc7i5dnhe",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:intel:nuc7i7dnhe",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:intel:nuc7i7dnke",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:intel:nuc8i7hnk",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:intel:nuc8i7hvk",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:intel:proset%2Fwireless_software_and_driver",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:intel:quartus_ii_programmer_and_tools",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:intel:server_platform_services_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:intel:trusted_execution_engine_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:intel:firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:intel:quartus_prime",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:intel:scs_discovery_utility",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:intel:Unite_Client",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:intel:graphics_driver",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003441"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Intel",
    "sources": [
      {
        "db": "BID",
        "id": "108485"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-763"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2019-0119",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2019-0119",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "VHN-140150",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 0.8,
            "id": "CVE-2019-0119",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2019-0119",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2019-0119",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201905-763",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-140150",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-140150"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-004739"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-763"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-0119"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow vulnerability in system firmware for Intel(R) Xeon(R) Processor D Family, Intel(R) Xeon(R) Scalable Processor, Intel(R) Server Board, Intel(R) Server System and Intel(R) Compute Module may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access. plural Intel The product contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel Unified Extensible Firmware Interface is prone to multiple security vulnerabilities. \nAttackers can leverage these issues to gain elevated privileges and  execute arbitrary code to cause denial-of-service conditions on the  affected device. Intel Server Board, etc. are all products of Intel Corporation of the United States. Intel Server Board is a server motherboard. Intel Xeon Scalable Processors are a scalable server central processing unit (CPU). Intel Xeon Processor D Family is a Xeon D series server central processing unit (CPU). A buffer overflow vulnerability exists in the system firmware of several Intel products. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. Attackers can exploit this vulnerability to cause buffer overflow or heap overflow, etc. A local attacker could exploit this vulnerability to elevate a new server and/or cause a denial of service",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2019-0119"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-004739"
      },
      {
        "db": "BID",
        "id": "108485"
      },
      {
        "db": "VULHUB",
        "id": "VHN-140150"
      }
    ],
    "trust": 1.98
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2019-0119",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "108485",
        "trust": 2.0
      },
      {
        "db": "JVN",
        "id": "JVNVU92328381",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003441",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-004739",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-763",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2019.2047",
        "trust": 0.6
      },
      {
        "db": "LENOVO",
        "id": "LEN-26294",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-140150",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-140150"
      },
      {
        "db": "BID",
        "id": "108485"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003441"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-004739"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-763"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-0119"
      }
    ]
  },
  "id": "VAR-201905-0867",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-140150"
      }
    ],
    "trust": 0.797873084
  },
  "last_update_date": "2024-11-23T20:21:11.178000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "INTEL-SA-00234 - IntelR SCS Discovery Utility and IntelR ACU Wizard Advisory",
        "trust": 0.8,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00234.html"
      },
      {
        "title": "INTEL-SA-00244 - IntelR QuartusR Software Advisory",
        "trust": 0.8,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00244.html"
      },
      {
        "title": "INTEL-SA-00245 - Intel UniteR Client for Android* Advisory",
        "trust": 0.8,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00245.html"
      },
      {
        "title": "INTEL-SA-00204 - Intel IntelR PROSet/Wireless WiFi Software Advisory",
        "trust": 0.8,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00204.html"
      },
      {
        "title": "INTEL-SA-00249 - IntelR i915 Graphics for Linux Advisory",
        "trust": 0.8,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00249.html"
      },
      {
        "title": "INTEL-SA-00213 - IntelR CSME, IntelR SPS, IntelR TXE, IntelR DAL, and IntelR AMT 2019.1 QSR Advisory",
        "trust": 0.8,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00213.html"
      },
      {
        "title": "INTEL-SA-00251 - IntelR NUC Advisory",
        "trust": 0.8,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00251.html"
      },
      {
        "title": "INTEL-SA-00218 - IntelR Graphics Driver for Windows* 2019.1 QSR Advisory",
        "trust": 0.8,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00218.html"
      },
      {
        "title": "INTEL-SA-00252 - IntelR Driver \u0026 Support Assistant Advisory",
        "trust": 0.8,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00252.html"
      },
      {
        "title": "INTEL-SA-00223 - Intel 2019.1 QSR UEFI Advisory",
        "trust": 0.8,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00223.html"
      },
      {
        "title": "INTEL-SA-00228 - Intel UniteR Client Advisory",
        "trust": 0.8,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00228.html"
      },
      {
        "title": "INTEL-SA-00233 - Microarchitectural Data Sampling Advisory",
        "trust": 0.8,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html"
      },
      {
        "title": "INTEL-SA-00223",
        "trust": 0.8,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00223.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003441"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-004739"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-140150"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-004739"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-0119"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.3,
        "url": "http://www.securityfocus.com/bid/108485"
      },
      {
        "trust": 1.7,
        "url": "https://support.f5.com/csp/article/k85585101"
      },
      {
        "trust": 1.7,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00223.html"
      },
      {
        "trust": 1.4,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2019-0119"
      },
      {
        "trust": 0.9,
        "url": "http://www.intel.com/"
      },
      {
        "trust": 0.9,
        "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00218.html"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92328381/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://mdsattacks.com/files/ridl.pdf"
      },
      {
        "trust": 0.8,
        "url": "https://mdsattacks.com/files/fallout.pdf"
      },
      {
        "trust": 0.8,
        "url": "https://zombieloadattack.com/"
      },
      {
        "trust": 0.8,
        "url": "https://www.intel.com/content/www/us/en/architecture-and-technology/mds.html"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0119"
      },
      {
        "trust": 0.8,
        "url": "https://jvn.jp/vu/jvnvu92328381/"
      },
      {
        "trust": 0.8,
        "url": "https://jvndb.jvn.jp/ja/contents/2019/jvndb-2019-003441.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2019.2047/"
      },
      {
        "trust": 0.6,
        "url": "https://support.lenovo.com/us/en/product_security/len-26294"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-140150"
      },
      {
        "db": "BID",
        "id": "108485"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003441"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-004739"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-763"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-0119"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-140150"
      },
      {
        "db": "BID",
        "id": "108485"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003441"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-004739"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-763"
      },
      {
        "db": "NVD",
        "id": "CVE-2019-0119"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-05-17T00:00:00",
        "db": "VULHUB",
        "id": "VHN-140150"
      },
      {
        "date": "2019-05-14T00:00:00",
        "db": "BID",
        "id": "108485"
      },
      {
        "date": "2019-05-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-003441"
      },
      {
        "date": "2019-06-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-004739"
      },
      {
        "date": "2019-05-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201905-763"
      },
      {
        "date": "2019-05-17T16:29:01.783000",
        "db": "NVD",
        "id": "CVE-2019-0119"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-06-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-140150"
      },
      {
        "date": "2019-05-14T00:00:00",
        "db": "BID",
        "id": "108485"
      },
      {
        "date": "2019-05-16T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-003441"
      },
      {
        "date": "2019-06-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2019-004739"
      },
      {
        "date": "2019-08-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201905-763"
      },
      {
        "date": "2024-11-21T04:16:16.060000",
        "db": "NVD",
        "id": "CVE-2019-0119"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "BID",
        "id": "108485"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-763"
      }
    ],
    "trust": 0.9
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Intel Multiple vulnerabilities in the product",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2019-003441"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201905-763"
      }
    ],
    "trust": 0.6
  }
}