Vulnerabilites related to intel - microcode
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:microcode:-:*:*:*:*:*:*:*", "matchCriteriaId": "B78FF9EC-BB2A-4352-9BE7-EFA749C99A9D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_3855u:-:*:*:*:*:*:*:*", "matchCriteriaId": "44FEB5D1-5177-4B5E-BB06-0C7E2A0CA6D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_3865u:-:*:*:*:*:*:*:*", "matchCriteriaId": "20F761B4-2DCE-4E31-9974-C399B4982EFA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_3955u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9796C997-40C0-4C75-B2B3-06D037138976", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_3965u:-:*:*:*:*:*:*:*", "matchCriteriaId": "11F8482B-2E48-4976-83D0-F1E4BA015FEA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_3965y:-:*:*:*:*:*:*:*", "matchCriteriaId": "D36CCEB4-62C0-427D-B4B3-41F9B1B9194E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*", "matchCriteriaId": "39831D4E-743A-4C09-900F-24DDAB5D1B22", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g3900:-:*:*:*:*:*:*:*", "matchCriteriaId": "25847980-2D7B-4D4B-B0F2-C2CAB648182C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g3900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5723C9D-E59D-4FA3-893F-D79E726025C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g3900te:-:*:*:*:*:*:*:*", "matchCriteriaId": "25BC4638-06F6-41C9-BF0F-74037F24CBEF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g3902e:-:*:*:*:*:*:*:*", "matchCriteriaId": "11A64939-F09B-4FEC-8F1D-FAC34D8E14BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g3920:-:*:*:*:*:*:*:*", "matchCriteriaId": "77D7291F-752E-409F-82BE-6060BA5E2559", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g3920t:-:*:*:*:*:*:*:*", "matchCriteriaId": "17560EF4-27C7-466A-9CD1-164F1B0F5B79", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*", "matchCriteriaId": "226CBC16-EC2A-4498-ADB3-655A0E9CF396", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9278297-5E4B-40D0-8782-E5AE87E43B7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g3940:-:*:*:*:*:*:*:*", "matchCriteriaId": "A562A07B-EDC4-4545-AC10-6CAA1494C6E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B801EF4-980C-40EF-84A8-4AA2D29CFB06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2129E439-63C1-4CBF-B39D-2941621AB454", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*", "matchCriteriaId": "26E9CDAC-8C63-4F9A-B171-9E5E11E5313E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g5205u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BFB5A51-399C-4AC5-BA09-E74C5AD520EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g5305u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F42D5DAA-8279-4A4F-A843-EBA0814952BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_4205u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6F8D167-C5B9-4B15-8861-529598D1C491", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_5405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "61FFCFE8-2B6E-4EB8-965C-AA5CB5493516", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_8269u:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDB4120A-B29F-496B-8FEB-CFD4A155202C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D740D69-83B6-4DBF-8617-9B1E96DFF4FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", "matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A6E16A4-5B81-412F-9B02-D15288F0EB52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-6100e:-:*:*:*:*:*:*:*", "matchCriteriaId": "8448F47A-F956-4228-9A13-24AE86C532CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0B9E6DB-C9C3-4B19-915B-B2E6E4D12158", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-6100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "78C4115F-E374-47E9-A81F-CC06FA72C67F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-6100te:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE81958E-5DFA-424C-9662-ECB1D9B738D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE0F2403-8146-4CA0-9E89-04022B375CEC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-6102e:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD67C284-EFCE-4530-8E68-42BB1B6F15C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-6110u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E8CD54D-7BB0-4CA7-99C6-8E3EC20E2265", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-6120:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE3DA00E-1BAC-4227-9ED0-F4757BC23B65", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-6120t:-:*:*:*:*:*:*:*", "matchCriteriaId": "34E0E209-5CEE-418F-B99B-9142CDE9ADE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*", "matchCriteriaId": "20B1E424-885F-4BB0-9257-8284A18B1655", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "BADEBE08-1478-4B88-9E06-5164BA0517DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-6300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D672383-B9AD-466E-8D6C-68DEC432B9A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-6320:-:*:*:*:*:*:*:*", "matchCriteriaId": "D16BDFF3-4CC0-4423-8385-C5E49C941F49", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-6320t:-:*:*:*:*:*:*:*", "matchCriteriaId": "048C652D-352D-4088-9986-30C280BC5C8B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7007u:-:*:*:*:*:*:*:*", "matchCriteriaId": "102122A3-D47E-4CD2-8151-4B708C39D3E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F2CA68-9EEA-421F-A92E-E7685EC010EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C17DCC3-9200-4198-B08D-EAD531B59995", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "31CBD3FB-0835-4F28-BFA2-3D07459066F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F059A42-0B43-4F79-BBAF-6ED05CFFE7EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B6B298A-1480-41C2-BE7C-7291E7256D7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB3ABEFE-11A5-4EC3-9537-F9C75A46FF65", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*", "matchCriteriaId": "14C20D2A-CD26-4019-A266-AB4E89EBD2E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7110u:-:*:*:*:*:*:*:*", "matchCriteriaId": "04C8B673-9E57-4970-AC45-EE3526757425", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6F9C441-D99C-4BA2-9269-83283507D7D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7120t:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF5748B4-1ED9-49DD-9140-DC7B47A30BB5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B608F333-BD78-4082-B2AE-0F5BBE7E0D9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F609E73-203F-45B9-9A3A-DC754B33860A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7320t:-:*:*:*:*:*:*:*", "matchCriteriaId": "00A6DEC8-14E3-4A0E-93A5-72BB607A9D18", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7340:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C195F5C-9666-48C7-A1C0-43E189B17EEA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8000:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD3CA819-AFF3-47F8-AABE-A5F9DA89BAE5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8000t:-:*:*:*:*:*:*:*", "matchCriteriaId": "06FDA087-0896-4138-9BA2-8238A845F5E7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8020:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8A63B09-D870-411D-8B26-ACDEE48C10F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8120:-:*:*:*:*:*:*:*", "matchCriteriaId": "408A8035-BE57-435B-85A5-9C59D3B2DD42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*", "matchCriteriaId": "62BFF15A-0C78-45BC-8E71-EDF624AC162D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F611716-F3D6-4187-AE71-4FF87C95C18E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "033028FD-BBD8-4BE0-B0D2-4744380D3EF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5F67974-81B3-43C2-8DAE-A66C6A876B7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1054FBFC-1609-4301-A0D0-B78878FB2427", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0F889F1-3B57-46C1-9C23-9E78CD0DEECF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "93929C7B-D4D9-436B-BA69-FD3C22FCEC2D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7F9109E-EADD-40F4-8360-BF7E37433E2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6310u:-:*:*:*:*:*:*:*", "matchCriteriaId": "02F5A50A-AAA4-440D-8AA3-54BE556322B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "41F7C959-BC66-40AB-8038-D37181A4CE5A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6360u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B9B3858-E58D-471E-8F12-DC109A133B81", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D37104E-78E5-4368-B67F-1F8C63873C3C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3B6BBA6-BAA6-4258-8A5D-94CD786A3B96", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6440eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "30DFA368-60E2-42D7-9C59-04F61F1A1FDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6440hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "0974E563-6326-4E79-95FF-40625440696E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6442eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B9D15BA-CC1B-4D83-9944-2593E2BA4AB2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6500:-:*:*:*:*:*:*:*", "matchCriteriaId": "467F294F-2FC5-4B2A-A1CD-4FE90F9D9C16", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E904FB93-EFF6-4E8E-92F2-95C4952B0240", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6500te:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B232290-B3AD-4BB5-80B8-4CB3E6259A44", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "772568B9-C502-4154-9320-16D78BF60B34", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "912614A7-45BA-411D-AE77-610EFE8D2A35", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-6600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FBD651A-306D-4341-8DEE-2E928CA6E0EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E993BEE9-72BD-4615-B1BE-5E9129D61ABD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FD6FEF4-73DA-47B7-966D-9C0C16089423", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFA6BB38-CDF8-46B0-9910-897AB7920D18", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF244D02-2B47-4884-8D70-37DFEB18CB60", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*", "matchCriteriaId": "615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE85AE7-B4BD-442E-AFAB-CD01744C91B7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2425FF8A-158C-40EE-BDBF-43E7641BC058", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADA681B4-37F8-4E2E-B73B-E0E17C66B754", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "173C6F98-4022-4F40-A39A-D3D490CA6461", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6EACCCA-7ADB-40B8-87DD-A55313E5BB97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F1BD53-55ED-4346-A67A-141B5BC552CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "44D7B5DF-716F-48E6-9445-BB56A620DEF1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F3E6176-6F6D-4488-A03B-2BBF846ADC93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3C31236-EEDA-4558-944D-A6859F1A779A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF705120-459D-49BA-BDCD-6AC38D95C820", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B91585C-4BD7-475B-8AC8-1B813A698D77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*", "matchCriteriaId": "70B7093E-97DA-4BED-AE7C-87090B82E5E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFA675E6-83DD-47FF-BEBC-D32E5223A065", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*", "matchCriteriaId": "F479F7E3-D0FA-4F66-8F5B-FFC845FFE5A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*", "matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8420:-:*:*:*:*:*:*:*", "matchCriteriaId": "874EF732-1067-45BB-BC15-DF815EC8CAFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8420t:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD92F60E-0103-44AC-A377-52FFACB0A701", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*", "matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8550:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB63EC2-E95B-43B5-BA7A-16314C968126", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8650:-:*:*:*:*:*:*:*", "matchCriteriaId": "238D4D09-7183-40D2-ABE0-4C477BCCEA49", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8650k:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CB1E0C8-5FFD-42A5-9798-1F324488A54A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-9300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A735A90-47E1-44C6-AE76-F6C7FFDCD4D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC9F52F-6669-459A-A0A9-8F472E1F2761", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7E91B92-4DB7-4866-8370-C6F8616D3D81", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "85F465BF-4548-45EB-AC40-384F4E6248EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1DFFFEB-CC63-4F51-8828-C5D4E0287264", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B176D141-26B0-477E-B2DB-2E48D6FB82AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD248D-0B95-4BE1-917F-E0976447927D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "104F999D-584F-4D34-9538-679EDBE3B180", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5726D5D4-F188-4F06-B78A-2C7C694A40E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*", "matchCriteriaId": "72467515-7793-479B-BABF-839275CA9AAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "56B79264-C756-408C-A32A-BFD4AA0B20CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D3DB891-40F6-4000-BEAE-A1710C70C43D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3EA33F-D137-4B24-9211-C8A62A7427A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "86FFF97C-C121-4F91-B62F-057356B0A048", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "213B09CA-91E9-4D11-AA11-B84F40495E9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAFC55E4-D84D-4588-976D-1E2637B1BF0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCB20762-51C5-44DD-9CEE-FEEC1E9C0E5A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAC1A189-D822-405B-A090-B1573FE12B14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "31C57E58-66E3-4FEC-A88F-B82C4B372B2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "C173CF7E-81DF-4AD5-AB17-A4C330B933D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "638549EC-1BB1-4206-B8DC-C0101BBEF8A3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8F450DA-5FBA-47BB-9A7D-75873FB3E69F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "112701D9-7154-46E5-BF36-EE36A607C7DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "87B5258B-26E4-4853-9F27-4BB12886CC38", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B1B04E8-A31F-4027-8E05-5461E7855F04", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BDD476-E402-408D-9BD6-886AB195704D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D566CFB-935B-40E4-9F4E-6216A42E7EBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8065A9B-4236-44AE-B60B-17F6695A705C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A97ED15-D0C6-4B64-BA08-EE50A6990272", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D57834B-C031-4301-9839-7A32F13687EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7640x:-:*:*:*:*:*:*:*", "matchCriteriaId": "F946429E-3362-41E5-88D9-FA01BE8D4312", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEE126ED-B743-4C6D-95FF-04F473A9A008", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D901944-8E2B-41E5-BB82-CF1C97064711", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A13E353-0063-468B-96CD-97BF91C747C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "913BBEFF-49E7-42AF-A850-B49E5A12AB98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E9EF2F2-750C-4CB7-9858-69D7FFA4EF31", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "8580A81E-8BDE-4EB5-B830-6AA7550A25C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8C1205B-6AC7-4DB5-B247-2108511D9957", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA47107D-237A-4184-8BA2-601660F7FB5C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9862E49-124E-4B7D-941A-CFD2668B6481", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*", "matchCriteriaId": "43756EB8-9F85-4499-99F0-43E69CA3F470", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE6572E2-5B24-4E21-9F6F-3A7A17A9F098", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*", "matchCriteriaId": "85C7AD56-CA31-4C08-A5C1-B50E767E1FFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8510y:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B8DD6D2-5F42-4E44-A4BB-D3179D83C2BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA0960D2-93EC-4CFC-B901-E38A59B798FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8670:-:*:*:*:*:*:*:*", "matchCriteriaId": "86817715-BF5A-40C8-8250-7A8CD637C05C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8670t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAAC740C-A02E-4342-8388-B85DDE54DF25", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8750hf:-:*:*:*:*:*:*:*", "matchCriteriaId": "083EFD47-11F5-46E8-8096-FA94F678E7D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-9750hf:-:*:*:*:*:*:*:*", "matchCriteriaId": "31CD303F-AAE9-4635-987D-742031232BDD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D0320CB-05E3-4D5B-BCEF-D862566B0AA2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93E897C-5D7B-4532-99D9-53192A1F776A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "33D0D618-D738-47F5-B7F7-C7F07972C893", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7A147E8-0778-49CE-92EF-ED1950138528", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B97260E-1D7A-45B5-AD86-EBF8CA259FE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "58002875-D63D-4ABD-A8B7-DCAEB7E94AE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAC07903-D4B7-423F-9F79-7DF45E5350BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FBC4FB5-7C2D-4E10-80BB-3951FFA3A6CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA65F0A9-8BBE-4674-86B8-894484DC6C88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B32C5EE-D845-471C-85EA-DA5F9B04F01B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D93CC48C-DCCB-442A-98D5-3165CCFAE7F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*", "matchCriteriaId": "659206BB-510A-47F8-8B6E-FD030A6BE1DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C3257F5-CA55-4F35-9D09-5B85253DE786", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "655E770E-B9EE-4B08-B1EE-F393C7F68941", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBC47200-8F3F-4969-AABA-39F4B1E4E263", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EB17629-2454-478B-8E1A-AC2D2FC2233C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A28B6DE9-D383-4CA2-94D5-4C9CFF95E01E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "A48A2969-DC53-48E2-A5CA-4DF2B00D1960", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_m3-6y30:-:*:*:*:*:*:*:*", "matchCriteriaId": "831048A2-657F-4F2C-83AC-802DF45204A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*", "matchCriteriaId": "18340F86-5545-4EEF-9F79-6560BB24F277", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_m5-6y54:-:*:*:*:*:*:*:*", "matchCriteriaId": "0504478A-E635-4A8B-A3F2-BE0E5908A7AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_m5-6y57:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AFFF65E-6576-41A5-82E0-F2EECDC64743", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_m7-6y75:-:*:*:*:*:*:*:*", "matchCriteriaId": "E29F8E70-5429-4756-A574-C7B60BE74A86", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_4405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4156AF88-99DA-4331-93A9-07F2049D6B07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_4405y:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F17DA0-EAF5-4BE0-B6CE-AE710C3F871E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_4410y:-:*:*:*:*:*:*:*", "matchCriteriaId": "F19C5C0D-02C3-4E4F-85CC-B647EFBCE8C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_4415u:-:*:*:*:*:*:*:*", "matchCriteriaId": "079877E5-12C3-4A37-98F8-443DA366BAB3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_4415y:-:*:*:*:*:*:*:*", "matchCriteriaId": "65B9D33E-4682-4EE7-90F7-950A1981AE09", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_g4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "A85AE2D5-1BA9-45F5-808A-166E27D7D6CE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_g4400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F142F6EC-F106-4828-B152-13612273A7AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_g4400te:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF5D3457-C139-499F-8B41-57C8E7E66D40", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_g4420:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6FEFAF2-7784-4407-B58A-A0B1DA84415F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_g4420t:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD36DCA7-31D4-4E50-A38C-C437CB2BB439", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_g4500:-:*:*:*:*:*:*:*", "matchCriteriaId": "63BED4F5-65DE-457D-9BDF-89AA5369304B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_g4500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C590C99-2770-4D63-9837-D1E1F251675D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_g4520:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1FC6A24-AF3E-4B7F-9C12-E947C3E4BB1E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_g4520t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C90F5FB0-7AAD-42F2-9780-E93A82E0C239", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_g4540:-:*:*:*:*:*:*:*", "matchCriteriaId": "B207606B-14AD-48D0-8219-A54D2617F067", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "5529CD96-F41E-4DD5-A9BE-6BDF84F9A9F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB78854-1E03-48F3-BC86-B0934641B47E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D3350F-8083-4FD3-9432-36C10EE911EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB28789-A195-4EB8-AE96-6E1EFEE93E6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C96A17A-44EE-4FD0-9187-9BB9202AA9C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D6425C6-A338-42A0-B236-12B33147931D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF3F6453-51EF-4509-94CB-24E8ECFBAC5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E78C7A9B-7DCE-416F-909E-B3CC52AEBE9C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DB488DD-D97C-4E21-A055-E6CECBBBC34E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DC12C97-9966-40E2-8B23-B4453EC9EA6A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*", "matchCriteriaId": "E687CADE-6E49-4284-BD41-6CA2FDD846FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A7540F0-7EB8-4F64-AA31-9AF3D79BEC46", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*", "matchCriteriaId": "B804174C-53DB-4641-BD26-3ECDD9FBD638", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FB59E56-9FBE-4D10-AFC0-03E0ED0A4120", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3930A6D-64DC-4953-AD7E-EED0C48B048E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B10FCF1-F496-4166-9162-41012C4D2B16", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACAAD0F0-9182-46EF-8399-C04FB472BE6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCADFB25-DCBB-4901-9E4D-132ED49C7F26", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0327393-DB2A-455B-8E20-3EDB3766CDA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2E00698-8A08-433F-8852-8EDC422A53D8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A25BD7C-F01B-49F6-8DB0-2F8B976AC9E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*", "matchCriteriaId": "4925D0EA-D524-432F-8417-892BB8C3DDFA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3757F7B-4283-4ABF-974B-59E4E2358035", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*", "matchCriteriaId": "93D86199-5CF3-4E7A-8295-50F958EA4B4C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "122BD094-E815-4081-B674-B71AC193BE0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*", "matchCriteriaId": "43126A13-5931-4989-BEFD-E1A096F98D94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*", "matchCriteriaId": "342E0783-288A-4DB0-A657-29937903927C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4C40F91-138F-4396-9A6B-B969F6AC30B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*", "matchCriteriaId": "23CA9365-B1C4-4188-A9BF-19215AFF58A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4797D2E-1270-447B-BFE4-CC96D9F10D5B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA77EB3-6F11-43BC-8B59-84217AA73205", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0866F1A3-8B9C-4B5A-B30D-71B3465EC80A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*", "matchCriteriaId": "331B8F10-3A20-46A8-B960-3546271CF701", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE638E59-DF75-43B1-A6DC-10A838B05B00", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*", "matchCriteriaId": "109FA97C-10EE-41F9-B52B-B37E31642251", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2184g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3FB62DD-090B-4434-9056-09427B66AAF0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67B3834-E59E-47AF-A806-13A990E812B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*", "matchCriteriaId": "79214F8B-1090-4DCD-B1F4-0FF78FC29C4A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD176FB0-7427-4F2E-A969-72062BB3EF98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B278081F-F900-4581-9D10-B5A2ACD2E2C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*", "matchCriteriaId": "45689B37-5085-41B3-BA9D-F05FD07DF1FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7186EA5-448F-473A-8FC8-058FC823ACC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*", "matchCriteriaId": "C12F0C71-8F25-4C77-A3F3-1231AC53C0CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB179A6F-FED8-45FB-89C7-3B17D6F5EB21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*", "matchCriteriaId": "F58AEEB9-919B-4C6C-83B6-080846786A56", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0BAE174-A158-4807-9D67-36F795028D76", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD38AEA-979D-484B-82F0-0161BA39E9F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*", "matchCriteriaId": "780AB9F4-0C87-4528-B53A-69FBC4D87ADB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2CA54AE-915F-45B9-B775-C04589E49802", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB86F018-1F56-4146-A78E-C7BF7B616023", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*", "matchCriteriaId": "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "00912C9C-D386-445E-B390-E96361ECDFA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*", "matchCriteriaId": "60B582A1-784C-4BE8-A0D5-706DE01D769E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2284g:-:*:*:*:*:*:*:*", "matchCriteriaId": "56F30E1A-8EF1-4C90-974C-791312241BCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*", "matchCriteriaId": "320597E9-6A2B-47E6-A33C-6B31A81902EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*", "matchCriteriaId": "556637E1-9502-41E7-B91D-082C92F233A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EA930BC-EF68-4AD5-AA1B-0659358028D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1220:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EF86C7D-C5AA-41D8-91ED-9314D1739C9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1225:-:*:*:*:*:*:*:*", "matchCriteriaId": "179C2A49-3D43-4C58-A050-31145B67E126", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1230:-:*:*:*:*:*:*:*", "matchCriteriaId": "304826C6-A953-414B-B80E-054668DA232D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1235l:-:*:*:*:*:*:*:*", "matchCriteriaId": "16F33CAD-2C43-4133-976A-BC906FCA7A44", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240:-:*:*:*:*:*:*:*", "matchCriteriaId": "43D85F67-B411-4008-9737-EA75C4D78651", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8344644-D1CA-45EB-B575-18280A33C425", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1245:-:*:*:*:*:*:*:*", "matchCriteriaId": "76F63AA1-A0F1-4BF7-AF23-F693187E7500", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1260l:-:*:*:*:*:*:*:*", "matchCriteriaId": "5676C017-20D2-41C6-B4A8-09E7CE6695A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1268l:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDAC29A-F2D1-4F10-84F7-26E7F704CE4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1270:-:*:*:*:*:*:*:*", "matchCriteriaId": "23544F02-3847-4089-97F1-8C29B5596B9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1275:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCF04937-1B14-4F2E-8819-5AF018AC9B65", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1280:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B4D80D1-B93C-4847-A1C0-3F624DA8EC0D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1285:-:*:*:*:*:*:*:*", "matchCriteriaId": "0358A0D8-058F-489C-919F-503D600DA2C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1501l:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C33CC23-E6EA-4C43-AB4E-5640CF1D1CDF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1501m:-:*:*:*:*:*:*:*", "matchCriteriaId": "61E0CEFF-C0A2-4FE6-9221-5D0C902890C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505l:-:*:*:*:*:*:*:*", "matchCriteriaId": "C52934C1-C482-4513-96A4-4BAD272796D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505m:-:*:*:*:*:*:*:*", "matchCriteriaId": "97177E87-37D0-410B-8809-E9F7FDF0ECF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1515m:-:*:*:*:*:*:*:*", "matchCriteriaId": "55B0106B-C693-4C60-B5F2-992896389E73", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1535m:-:*:*:*:*:*:*:*", "matchCriteriaId": "28C6633C-5D49-469F-96D3-681CD999E630", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1545m:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF4E5358-CCBA-468F-A5FE-9B5AAD129C1C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1558l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0B9EC88-98E2-4358-A3F7-638BD1F48A2F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1565l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E34AD4BC-3262-40DF-AE66-6875B8BF3C65", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1575m:-:*:*:*:*:*:*:*", "matchCriteriaId": "199CB378-5BDB-441B-9B52-D870D222781B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1578l:-:*:*:*:*:*:*:*", "matchCriteriaId": "104B4B4D-A9AF-4007-B1A3-4D509DA19C84", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1585:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5BCF9D5-7769-4F6F-AA3B-E430788BB74D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1585l:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD15D0B8-2880-4DDE-B524-E9C6D6D0E808", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE862F15-69CC-488E-ABE8-1E23A5A1089F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*", "matchCriteriaId": "9087D09E-ADCB-478A-87FD-B7113FD29EFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B43E11E-5350-4DDB-A743-F84D4D2286D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D64D1ED-A386-4475-99AB-7727DE67E1A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EFB4646-A5BA-4662-A47F-62407AFEDFF2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*", "matchCriteriaId": "29A923F6-E352-4752-B7D3-007FE1CAFE06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*", "matchCriteriaId": "070C20AB-66F2-4EE2-8134-5E40DBB9B9E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5215m:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADE3148E-2DCE-4CA9-ABE3-43779D06DD42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5215r:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7695723-292D-44DF-8E06-D1040433D0A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CA49CF7-C6BE-4337-A0A8-A603D8955EE9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C8F7F6B-847A-479D-B6B1-BBA331D06DE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C375A9D-C7CE-49A6-B08D-9CAB22E16D32", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*", "matchCriteriaId": "93B8CDF0-1489-4E4C-B004-A22E06FC10D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6ACF161-472E-4088-85C2-5940C9C88D45", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E0B94F6-EC15-4C12-8BA5-CC6602A7A725", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*", "matchCriteriaId": "067C65E5-5392-4DAF-A6BD-640D78C19CE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1647DAC-CED6-4DAF-8F82-A42D6D691DF0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*", "matchCriteriaId": "D93CC498-F558-4C2F-9E14-7897060CA9FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*", "matchCriteriaId": "D609DB7E-AE80-48E0-B7B6-E622B6208ABF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A09C3656-AE49-4F26-BD28-B725E8C40304", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*", "matchCriteriaId": "90F0D1EF-2FE1-498A-AE38-BF755A680E88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*", "matchCriteriaId": "22243DEF-F01B-4774-AEC1-40D776E1167E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*", "matchCriteriaId": "25934425-944F-4B9A-8A16-F1DCBF3D5032", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A5BC76B-A4FC-4702-A544-889E62F8509E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F4E44C3-D29F-4057-AE12-BA19FFFF69E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*", "matchCriteriaId": "383DCE68-3882-4274-AA4A-5E030530E4BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*", "matchCriteriaId": "04EC7421-963C-43F7-9450-2E204BAFF1F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6134m:-:*:*:*:*:*:*:*", "matchCriteriaId": "177E380A-583E-47C9-A61B-0632AB818546", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E3AF74E-C719-4E55-959D-681174FFFB90", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*", "matchCriteriaId": "E290F38C-7A86-469D-9E6A-F0EC69DBE23A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EF77397-85D0-4EC2-9887-2D0D9D253450", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A003F1FD-33A0-40B8-B2DC-75B5DB62B2C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*", "matchCriteriaId": "E921DEBA-3063-4639-9823-2FDDD8DEA793", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FCC81D7-E2EA-439C-9844-3C35C83549FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF44A7C9-834B-49DF-B1B6-B1575473179B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*", "matchCriteriaId": "5983B72F-9194-47CB-B444-2ECC6360B686", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6142m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2F1CD58-8C5C-479D-95ED-51A041D2D1B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*", "matchCriteriaId": "09C7CDA3-7C4D-4884-BF36-A8EB2C80C6B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E0E40BC-5745-4AB0-B991-61A0C63DB284", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E207648-E57F-4C43-8FDD-049BF9214664", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*", "matchCriteriaId": "39EB131A-87DE-45FB-9025-B02EC28C4304", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AF30717-CBEF-42F9-AE0D-4F6A1877EA55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99D0351-303B-4ABF-A7FD-734176095307", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B080431-626C-4A7B-AB37-47EE6811A5A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*", "matchCriteriaId": "178345A5-9A38-4C8F-B3BB-430276FA4998", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*", "matchCriteriaId": "831A7D63-4638-480C-94CB-ED06613BA75C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*", "matchCriteriaId": "EED0D492-ADAB-41ED-A283-024D3CED441F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BBB5A97-EA4F-454C-819C-DE1CE7018E7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FD24563-9157-4DE1-95ED-D4E3E879219E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*", "matchCriteriaId": "F83F8602-6679-4B3C-BBDD-3BDB2B317F70", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CD3E45C-1943-42BA-9F6D-EA64D67BF954", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF7B4C84-1258-4F2F-B8A3-55353B3D13BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6238m:-:*:*:*:*:*:*:*", "matchCriteriaId": "352D121E-69C0-470E-AE02-8413DCBE1DC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E21977E-7085-46C5-8E89-F952C2EBCE04", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB72D13B-5880-4CB2-8E80-CB6A39B5A302", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*", "matchCriteriaId": "02BCB7D2-4B68-4FF8-BFC9-06C39A708C62", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6240m:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E231B13-FC1B-41E3-A47D-4F0FC4F37B33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C8292CC-DACB-489A-BCB2-73DC2C6F944C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF72F37A-2F28-40E6-A84B-0E1DF63B1812", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BAE2B11-B0F5-415F-BD6B-E285EF9C9095", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BA58EFB-7672-4902-ABC1-65217AA617AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*", "matchCriteriaId": "96E2764D-7D6A-4CE0-A628-FFE966A6462F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B704835-1250-44E1-923C-5DE2F4DD25D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*", "matchCriteriaId": "9236F094-B913-43F2-B703-CE33B9CEBA0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*", "matchCriteriaId": "E45FA170-5BBD-45FC-ABDF-FF0FAE58A50E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*", "matchCriteriaId": "345FF353-FE25-41F4-97EC-FF32BE2796EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*", "matchCriteriaId": "68A9AD79-9B4B-4EE8-810B-359901C3540C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFD4F26B-8589-4BB0-8FC1-9F51E3B477F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8160m:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEDB5450-7B93-46C9-A112-7E2C7BEE1C58", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*", "matchCriteriaId": "19BF77DA-E159-4336-A552-B22BE437670D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*", "matchCriteriaId": "E86CCC45-270E-4760-A7E9-D39C74C00FCF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*", "matchCriteriaId": "C105930C-D2BB-4FA1-B5D1-882D90D867C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*", "matchCriteriaId": "45227E88-ACFF-43A5-AF45-C6542A6EF681", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8170m:-:*:*:*:*:*:*:*", "matchCriteriaId": "31D59E6A-FC0A-4169-9600-9F83E82FA7E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA2030D-CEAF-46BF-9669-19EAD541BDB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*", "matchCriteriaId": "1612AE8A-3165-47A3-AEA8-65F4156C48BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8176m:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB0C8383-AD0D-4250-9A2E-27B05BD102B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5168E40-DF2F-4E39-8B5E-9659EBBB99A3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8180m:-:*:*:*:*:*:*:*", "matchCriteriaId": "505C611B-8369-4738-8F2E-174B4BFB2A99", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*", "matchCriteriaId": "94A6DA7A-7C97-40E1-B31A-B92BB658C429", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*", "matchCriteriaId": "54AF128B-9984-4C91-B7F6-968DE376C3BE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "28B167F1-63FA-4C86-84AB-836ABF84E6E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*", "matchCriteriaId": "955420F9-3A3F-40E0-9940-DD43C5C78D62", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8260m:-:*:*:*:*:*:*:*", "matchCriteriaId": "3219701A-8CF0-4307-A957-1E31F6A5C195", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC4A437C-6C00-4729-91CC-D27EB3542633", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*", "matchCriteriaId": "74ED727D-B1A9-4F4B-92C7-3F00F3A80013", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2C24951-B3FA-48E6-AFAC-6CA0D2348230", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*", "matchCriteriaId": "185E8FBC-9EE9-472E-867B-0B0DEEECA13E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB3C00A0-C28A-46EB-853D-DAE3819399D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8276m:-:*:*:*:*:*:*:*", "matchCriteriaId": "11562A6B-26CD-40A6-9184-7CA128E1F017", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*", "matchCriteriaId": "0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0CAB607-87B2-49F4-9FAB-662D5EA3D11C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8280m:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C950976-266D-4258-86CB-8987C093331F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_9220:-:*:*:*:*:*:*:*", "matchCriteriaId": "D95CE641-1BFD-4236-8B34-2C65D1EB1E95", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBC93757-5FD7-403D-B5ED-CC8793002352", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A7019D4-58E0-4B73-93B8-D3B0E86BF2D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DF8D8C4-29EA-4D09-87AB-A570403BA0E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*", "matchCriteriaId": "89421EC5-52E5-441F-AD3B-5C5E964F836D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_p-8124:-:*:*:*:*:*:*:*", "matchCriteriaId": "13643812-C068-4C7D-8E3F-499316D661C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_p-8136:-:*:*:*:*:*:*:*", "matchCriteriaId": "A57D6497-607A-407C-BF1B-88E30F702F8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*", "matchCriteriaId": "2117880B-FDD4-4A90-B29B-6D840D26645D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8EED1D9-75CC-41E9-9C0C-C648E0717024", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDB43A67-9DD7-49E6-BA77-220120C90700", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3413CB-86D3-4684-B651-DBACC0660E76", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB677676-E793-4158-BF53-3F5ECCECE203", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F32E6092-1AF6-499F-B176-F575E766E8F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*", "matchCriteriaId": "E524AFD4-2D9F-4A4B-82F4-13BCDE99041E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*", "matchCriteriaId": "39F309BC-6F31-490C-982B-14F9319276F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA909754-B60A-4B30-AF42-4C8734E155AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4208r:-:*:*:*:*:*:*:*", "matchCriteriaId": "8219101A-9A47-40C5-B3F6-2C8BB2D430D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBEFB056-0872-434B-9630-28A1AAEAD470", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*", "matchCriteriaId": "21A62CB9-FB01-45CB-9E10-E72D87C0E1F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD8EBFCC-AD76-4285-93BD-D14219C6EA5D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1B4F7FE-61A3-417A-BAA9-E686A76F3A94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4214c:-:*:*:*:*:*:*:*", "matchCriteriaId": "3790FB2B-8FF0-4211-ACC6-306FBE64B080", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DE4C87E-CB23-4804-9BBD-2533C5E1D6D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*", "matchCriteriaId": "7305838B-84CA-4BB8-A350-B2D2844F1041", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*", "matchCriteriaId": "D356D196-8AB0-4387-A644-C5E68174A60C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4216r:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFA23945-1D17-4DC3-AFD4-6A165E22867F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BA7061E-E26C-4905-AB41-18267DD32821", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AFC055D-B249-4EB4-8A9F-BE4391A27505", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6F5DF76-FC10-4562-9AD9-6675F3D6CF3C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F91FC3-CF90-450D-9E71-4A301A997921", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*", "matchCriteriaId": "739731E7-F1BF-4D12-B103-E7F85B35307E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1C36BE-D4DC-4965-8106-EDA77BDB64DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*", "matchCriteriaId": "15B85362-44E5-4107-AC8A-29DEE2A7EEDD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*", "matchCriteriaId": "63293B85-A014-4F23-97EE-6CE3467FCB06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*", "matchCriteriaId": "708D6E00-A2E5-4B08-88E7-C872ACFC341D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CD8EE0E-2BA3-49DD-91D1-81AB67F16475", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC75E5CF-4241-45A8-AD45-1F7F077CEEA1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*", "matchCriteriaId": "D132291B-AADD-49E3-ADD6-333E1F1D8DFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ADF328B-D286-4C36-9F21-11A58D55D03A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6D23470-A702-426D-A63C-4F7BAC158762", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*", "matchCriteriaId": "750A77C5-1367-4E04-9ABF-1AB2D46C29C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1340A29-3428-4FAD-AA07-7F625915E34D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADA1FA19-A836-4D6A-8C2D-718ECE6866D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*", "matchCriteriaId": "3ECEBDB0-2E0A-416B-9737-82C1FC65A06C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*", "matchCriteriaId": "C39B6A99-7060-4011-8FA3-E5ABE5C02813", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF9E723E-1095-424E-A90D-380CA0D2795E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*", "matchCriteriaId": "35380FB9-90FF-405F-8E2E-01C1DD209540", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*", "matchCriteriaId": "2215D655-0EA9-4530-AB68-7B1C7360D692", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*", "matchCriteriaId": "020B6FED-EAE2-478C-8FF4-CB75F24E9A9D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE519C62-F5BB-461C-91EF-2979CD506C63", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*", "matchCriteriaId": "F693457C-3529-4E62-A672-1B862F235D0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FE996B1-6951-4F85-AA58-B99A379D2163", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:hcl_compute_node_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "D803466A-164C-4B84-B78F-C0B5C628D69A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:hcl_compute_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CE42ACD-09F6-441F-9436-86C7AC16A242", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "17C3B32E-E1F2-446A-B8AE-5F3E285BD5B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "02DEB4FB-A21D-4CB1-B522-EEE5093E8521", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3BCF7CA-6C05-4FD5-A965-0F038F63D70A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4588E5F-58E1-4C82-9551-8EAD5FFE08B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Una eliminaci\u00f3n inapropiada de informaci\u00f3n confidencial antes del almacenamiento o transferencia en algunos Intel\u00ae Processors, puede habilitar a un usuario autenticado para permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local" } ], "id": "CVE-2020-8696", "lastModified": "2024-11-21T05:39:16.940", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-12T18:15:16.707", "references": [ { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html" }, { "source": "secure@intel.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0006/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-212" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
intel | microcode | * | |
debian | debian_linux | 10.0 | |
netapp | fas\/aff_bios | - | |
netapp | hci_compute_node_bios | - | |
netapp | solidfire_bios | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:microcode:*:*:*:*:*:*:*:*", "matchCriteriaId": "C76EBE1C-570F-485B-B850-9E3BB00240B2", "versionEndExcluding": "20210608", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:fas\\/aff_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "A714C8D4-9623-43C0-8AF8-8904566AD42C", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C61DF9A-ABDE-44A2-A060-B088428D5064", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3BCF7CA-6C05-4FD5-A965-0F038F63D70A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Una discrepancia de sincronizaci\u00f3n observable en algunos Intel\u00ae Processors puede permitir a un usuario autenticado permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local" } ], "id": "CVE-2020-24512", "lastModified": "2024-11-21T05:14:56.830", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-09T19:15:08.930", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0005/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4934" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:microcode:-:*:*:*:*:*:*:*", "matchCriteriaId": "B78FF9EC-BB2A-4352-9BE7-EFA749C99A9D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF64D95C-653A-4864-A572-CD0A64B6CDF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C60AF0D-983D-454E-8940-209C471DC041", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F26C6DA-ED6B-444A-A63A-5155FCA4F0DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0D9B687-C3EE-4AF5-B9BE-7F0698D0F258", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "114DF43C-839F-4066-AA30-8DC16B1D6687", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5F6F725-217C-48FF-86DD-E91A24156121", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "365696BF-CE3D-4CE6-92A8-413DDE43774E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "158CC66D-32E5-4396-8E5D-4D90EE9AB62C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E84F0381-296A-408E-90D4-A316EE894A9D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "5601E40A-96E1-4321-9682-055A1C607488", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "12ADA9A2-6E64-4F17-B369-816639F0D3BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FE996B1-6951-4F85-AA58-B99A379D2163", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C61DF9A-ABDE-44A2-A060-B088428D5064", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "17C3B32E-E1F2-446A-B8AE-5F3E285BD5B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "02DEB4FB-A21D-4CB1-B522-EEE5093E8521", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3BCF7CA-6C05-4FD5-A965-0F038F63D70A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4588E5F-58E1-4C82-9551-8EAD5FFE08B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5320759-AAAB-4FEA-99AB-51A7F7EE9F58", "versionEndExcluding": "22.01.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "480C5657-5C05-40F5-B76A-E67119727ED8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F6CA254-45AF-497D-9D1D-0CF4A8922883", "versionEndExcluding": "21.01.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5AECF7C4-3FF7-4663-A49C-9DB91BA5C28E", "versionEndExcluding": "21.01.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "26B17683-E061-4CB9-BB8E-9EC8612DA1A1", "versionEndExcluding": "21.01.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6779ADD8-298D-4FF4-8AD3-82E995B2E144", "versionEndExcluding": "25.02.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D3BECCA-5783-4B3C-B659-21160B4D2726", "versionEndExcluding": "25.02.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF2E9EAA-2D26-4271-B2A3-CA3BB71D0149", "versionEndExcluding": "25.02.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F9FA42D-B2F0-456F-89B7-6A5789787FBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C5CB316-59B9-4DDB-A8B8-14D8BCD991CE", "versionEndExcluding": "25.02.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4ABF49D4-34CE-4DEA-AA2E-A40A53472D1F", "versionEndExcluding": "23.01.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Un aislamiento inapropiado de los recursos compartidos en algunos Intel\u00ae Processors, puede habilitar a un usuario autenticado para permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local" } ], "id": "CVE-2020-8698", "lastModified": "2024-11-21T05:39:17.130", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-12T18:15:16.783", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html" }, { "source": "secure@intel.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0006/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D", "vulnerable": true }, { "criteria": "cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFA1950D-1D9F-4401-AA86-CF3028EFD286", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:microcode:*:*:*:*:*:*:*:*", "matchCriteriaId": "59DDC2D1-D21B-4CD3-87A0-3AF07336E504", "versionEndExcluding": "20230808", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_5205u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFA35154-5EFD-4DF9-B099-6D752452A8D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*", "matchCriteriaId": "39831D4E-743A-4C09-900F-24DDAB5D1B22", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B801EF4-980C-40EF-84A8-4AA2D29CFB06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2129E439-63C1-4CBF-B39D-2941621AB454", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*", "matchCriteriaId": "26E9CDAC-8C63-4F9A-B171-9E5E11E5313E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "545649F6-46CA-40CB-8A00-5DD40F6A83B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g5900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D42AC70C-B114-4795-8769-D9AF12298456", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g5905:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DEF520D-9427-4C5A-81F0-FCED5E2A8B99", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g5905t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B773674-1DB0-41D8-A758-2AF49F4722D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g5920:-:*:*:*:*:*:*:*", "matchCriteriaId": "153ABD9D-2C72-40C6-8DF9-3EB7D1D35B09", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_g5925:-:*:*:*:*:*:*:*", "matchCriteriaId": "4036274A-CC6F-48B2-BF2E-DF51C4148B93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF64D95C-653A-4864-A572-CD0A64B6CDF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9CBE9-CF87-495B-8D80-5DDDCD2044B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*", "matchCriteriaId": "614B1B4E-E1D7-417F-86D1-92F75D597E36", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BD11E86-B786-43C8-9B67-8F680CC30451", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9963C9F-2D15-479A-A6C1-0C9863904B7E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8B15567-BFEA-43BE-9817-98A1F5548541", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*", "matchCriteriaId": "984C7C7A-2F8E-4918-8526-64A080943E0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", "matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*", "matchCriteriaId": "43454510-4BE7-4CD1-960D-AE1B36EFBEA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7AFC285-2248-45E7-9009-1402628F17E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "078DAE1F-8581-44FB-83EA-575685928C4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*", "matchCriteriaId": "887BEC29-AD0D-4BEB-B50B-F961629BBF23", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*", "matchCriteriaId": "93859A03-DE41-4E7B-8646-93925ACBFC42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FD8BD84-B6F9-48D5-8903-2C56C12EFFEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*", "matchCriteriaId": "9877F278-641B-4F83-B420-AB4E1018EA9E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ABF9AEE-BE1C-40EF-9E5F-6F3641BA7CDE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C60AF0D-983D-454E-8940-209C471DC041", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F26C6DA-ED6B-444A-A63A-5155FCA4F0DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*", "matchCriteriaId": "66BAF09D-8199-4579-B25A-E7C5177385E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "21EA30AA-713F-40AD-8C94-C1129198EE98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0D9B687-C3EE-4AF5-B9BE-7F0698D0F258", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "114DF43C-839F-4066-AA30-8DC16B1D6687", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F2CA68-9EEA-421F-A92E-E7685EC010EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC9F763B-B469-42DC-952F-48448121373F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C17DCC3-9200-4198-B08D-EAD531B59995", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7C8B4BA-24E8-4856-A2D9-BD2CE2C858AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F059A42-0B43-4F79-BBAF-6ED05CFFE7EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B6B298A-1480-41C2-BE7C-7291E7256D7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB3ABEFE-11A5-4EC3-9537-F9C75A46FF65", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*", "matchCriteriaId": "14C20D2A-CD26-4019-A266-AB4E89EBD2E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6F9C441-D99C-4BA2-9269-83283507D7D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7120t:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF5748B4-1ED9-49DD-9140-DC7B47A30BB5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F609E73-203F-45B9-9A3A-DC754B33860A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E3A734E-973B-4904-A905-51E438879B8F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CF355B2-A5D6-41CC-8404-2B61A594BA6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7310t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D097A186-120C-49F7-94DB-A6FC3A42BDFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C51A38C-E4AE-46B9-ACE6-82E8F7B668D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7320t:-:*:*:*:*:*:*:*", "matchCriteriaId": "00A6DEC8-14E3-4A0E-93A5-72BB607A9D18", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7340:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C195F5C-9666-48C7-A1C0-43E189B17EEA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E86321B-B1BD-43B7-A7F5-05CABE35F40E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100f:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC411FF8-C702-4D37-8FD5-DE18D4C9B02F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*", "matchCriteriaId": "89E9DCEC-6AFD-476F-93A1-E19BFC124BD9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-9100f:-:*:*:*:*:*:*:*", "matchCriteriaId": "53F1B439-37B2-4425-8359-D3C86CD76BBE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D53FC6C0-C1B3-422F-BAFC-3B4CD0EB28B7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CA88723-29A0-4F7C-BED3-70E35F913384", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "85B0AC6F-52DC-4697-A29A-B4DE51B41D57", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*", "matchCriteriaId": "64206B12-9CB6-4E4F-9200-EE062693FC9E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "98752CBB-B870-4DA2-BF09-0A6A847E7F19", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-9350kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AA7EEBF-ED6E-4838-ADAE-0D7BA4E65867", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "403E8A3A-28C2-4329-BF31-1A530E317959", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5F6F725-217C-48FF-86DD-E91A24156121", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "365696BF-CE3D-4CE6-92A8-413DDE43774E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6F3DE58-EC72-429F-A223-F2027D2828AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BF497A0-30BC-42A4-A000-C0D564D4872A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3025301-52D3-43D7-B6AB-F3F0A5C882DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9466A6CC-8D69-4EB5-94E2-611297120462", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2D116C4-698B-45BC-8622-87E142B37922", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DCA6E61-F1C9-4629-9068-545B19CF95E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "36836EB0-99DD-4217-9182-1E9FC5656C42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C26205-C602-46F6-B611-424709325D6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "464587A0-9EAA-4DF5-AFEB-15F2FA9CD407", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "1940F59A-67FD-45F9-9C78-51A50687628F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B722E2A-1262-44FD-8F7C-F9A9A5C78744", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DEFF6A7-0DE2-4BEE-80DC-BBAB259647AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BCD9C35-95D0-49E6-A9AC-E3AA8CD3F7B0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B40E9EC2-A8A6-4800-9F9E-B1237832D6F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "158CC66D-32E5-4396-8E5D-4D90EE9AB62C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*", "matchCriteriaId": "55227C1C-D6CE-40AD-A5AA-7143E0A7AEF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E84F0381-296A-408E-90D4-A316EE894A9D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*", "matchCriteriaId": "092E3E45-5F58-412F-BAC9-C3B5290D8349", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EA7E6D0-0ADA-4BE1-8273-69AB3DE3BA36", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6FCAFC0-EEE2-43E4-AE90-1803588B5689", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8640175-3BC2-4C7B-A5A3-51E5677EDECA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "7077CBF1-1FC8-4AF9-8B39-A15871FFD3CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "53D902B5-D135-4961-AED9-EA6DF06534B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*", "matchCriteriaId": "2910EB49-C9C6-4FC9-AA55-E7A0DAE28B93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "B858B433-9DA0-4224-B94C-4962FB3A4138", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F6B5FC3-8E55-430A-A55A-AF541690C576", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*", "matchCriteriaId": "55568460-F318-48FB-90E4-55CBBAF13E59", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11500he:-:*:*:*:*:*:*:*", "matchCriteriaId": "0242C717-1C3F-4D9E-B068-F3102A40E6A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7AFF680-DBC6-432E-A6DE-E7E7E4F2F26A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADB84973-3DAC-4458-A817-943302F5EFF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B26C730-32FA-4D51-88FA-E724147147BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFF7C5BF-E151-42DB-B0CF-E2589904C9A3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "E12D6BD2-7D32-4194-84D3-A0DE4B88BFF0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3EC487F-B9A8-410F-AE1F-8D1B74BA77D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFA6BB38-CDF8-46B0-9910-897AB7920D18", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF244D02-2B47-4884-8D70-37DFEB18CB60", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*", "matchCriteriaId": "615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2425FF8A-158C-40EE-BDBF-43E7641BC058", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADA681B4-37F8-4E2E-B73B-E0E17C66B754", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "173C6F98-4022-4F40-A39A-D3D490CA6461", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6EACCCA-7ADB-40B8-87DD-A55313E5BB97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "44D7B5DF-716F-48E6-9445-BB56A620DEF1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F3E6176-6F6D-4488-A03B-2BBF846ADC93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF705120-459D-49BA-BDCD-6AC38D95C820", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B91585C-4BD7-475B-8AC8-1B813A698D77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*", "matchCriteriaId": "70B7093E-97DA-4BED-AE7C-87090B82E5E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A205DBD9-A841-446A-8ED8-57989B806518", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFEF82DB-59F7-4530-B3CC-3D417CD519B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*", "matchCriteriaId": "70D9D4EE-A6CA-4C9F-905F-27570858B5FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*", "matchCriteriaId": "73DA1253-1652-417A-BE27-586EF8ED59F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*", "matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*", "matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC9F52F-6669-459A-A0A9-8F472E1F2761", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7E91B92-4DB7-4866-8370-C6F8616D3D81", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7950151-6BF6-4A80-9370-ED92B59635BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F7D93A-7C16-4189-ACF2-9B3760180FCE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-9500f:-:*:*:*:*:*:*:*", "matchCriteriaId": "24A5BA20-2193-4C17-BBDC-8615D9333D96", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8A3281-8FB9-4695-A5BB-F33B5EB6EF2C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*", "matchCriteriaId": "26975700-3A56-4D17-ADDC-77CCE82A6C98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1DFFFEB-CC63-4F51-8828-C5D4E0287264", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B176D141-26B0-477E-B2DB-2E48D6FB82AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "43B9F540-DFCD-40B2-8DE2-9AE9D123A48F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1068g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "322A1FD8-D2D3-4C24-B7A7-9D77EE933965", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1978F85-5BA5-468E-B797-7FA7EB4F489D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EB23D0C-D2BC-4E7F-94AF-CAF171A64307", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CC9312B-40A7-4D4A-A61C-3BA865C29F63", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EBECBE5-2BF0-4175-81CC-C6D054C819B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB33CC4F-9D51-4A11-B063-6E78F0D71555", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", "matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", "matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", "matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*", "matchCriteriaId": "63719B1D-5A98-44E3-80D8-CF0B4C1C6F80", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5365D3B-1B0B-416D-ACFB-23843FD25EAF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*", "matchCriteriaId": "2556EF0A-B29F-4E9E-BB77-955CBC851EFA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AD253CF-55F8-4350-AD79-6CB5526DEB57", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "5601E40A-96E1-4321-9682-055A1C607488", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF36D9CC-2FD8-4D08-8712-E625D4754613", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*", "matchCriteriaId": "3252CF19-9D1D-4A46-9C94-0E7255CDDD8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "E11C7F38-3313-4F6D-9D5D-E61C89E716B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "70B0C976-3B68-4647-909A-5D574D711C7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA18192E-7DBB-45BB-8568-CA7159AF8CE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2FDB568-5340-4DD8-B933-1CD64C370BD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D28DF93B-E15D-47D3-B9C0-4AEE8B7FADD0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F2DD1D-DB6F-44D1-BE3B-C798C09CC5F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*", "matchCriteriaId": "104B88E7-3B8F-4C4E-AD07-CAD1DCD7898B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "12ADA9A2-6E64-4F17-B369-816639F0D3BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*", "matchCriteriaId": "514B7B5E-D60D-464A-8CB0-273044FD2E09", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFB608EE-83AF-4192-93E1-7DDBA5F6A54C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "B807B5D8-BCDB-4398-8ADC-DBD1BD8D2B88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A97ED15-D0C6-4B64-BA08-EE50A6990272", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D57834B-C031-4301-9839-7A32F13687EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEE126ED-B743-4C6D-95FF-04F473A9A008", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D901944-8E2B-41E5-BB82-CF1C97064711", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "913BBEFF-49E7-42AF-A850-B49E5A12AB98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E9EF2F2-750C-4CB7-9858-69D7FFA4EF31", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "8580A81E-8BDE-4EB5-B830-6AA7550A25C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8C1205B-6AC7-4DB5-B247-2108511D9957", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*", "matchCriteriaId": "43756EB8-9F85-4499-99F0-43E69CA3F470", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6D63DC7-0623-4777-86EC-06697FEBFD10", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*", "matchCriteriaId": "C289687E-4D0F-4F32-92A8-137B5D6AA3C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC758216-672D-4F7B-8CF3-6433B06AA2FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-9800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "57014B8E-5689-416B-9FE6-CE4A259E83C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*", "matchCriteriaId": "39F9F143-0AB4-4302-82B8-B4EA790EB08D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE73B0A0-E275-449D-8ADD-86AE188DE82A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE06C64A-1610-4340-98CF-AC91258AB215", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*", "matchCriteriaId": "B07609EB-E10B-4253-938E-81566036D81B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B7AEF3-7A62-43B2-8F0C-70E5A2CDB29A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC44D69-AAAB-4524-9D12-F1A606D57831", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D23D2887-1246-4EA4-B8B6-57BC7FB869E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93E897C-5D7B-4532-99D9-53192A1F776A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "33D0D618-D738-47F5-B7F7-C7F07972C893", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7A147E8-0778-49CE-92EF-ED1950138528", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D264277-00CB-4FCC-ADAA-38536609D0F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DFC6D19-9E02-4DE5-818F-931779A41F74", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CC25725-73F6-4948-B17A-A05E8978EB78", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D9BFA32-89B3-4E26-B980-2694B5378D8B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*", "matchCriteriaId": "65E2A7C5-78D9-4F75-B8A2-5EB3ECEFBFF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2D04A37-79EE-467B-BD8A-0CA0BDD85F0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FECF6BE-2CED-4510-91C5-195686C9C421", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B903E2A0-EE73-4F13-AB26-8F5644462E94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*", "matchCriteriaId": "170B497C-05F2-46B5-92CD-ACF7C0BE1711", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEF53EA8-8EB4-455C-A986-405DBB122D3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B97260E-1D7A-45B5-AD86-EBF8CA259FE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "58002875-D63D-4ABD-A8B7-DCAEB7E94AE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAC07903-D4B7-423F-9F79-7DF45E5350BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FBC4FB5-7C2D-4E10-80BB-3951FFA3A6CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA65F0A9-8BBE-4674-86B8-894484DC6C88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D93CC48C-DCCB-442A-98D5-3165CCFAE7F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A2CB2A8-F7A2-44ED-92C5-5EDF32AA9A0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C3257F5-CA55-4F35-9D09-5B85253DE786", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*", "matchCriteriaId": "5598510F-1057-4DB6-838C-8945FB6978DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC2ADBEF-CF97-410A-816B-F9D1E3BAF205", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "655E770E-B9EE-4B08-B1EE-F393C7F68941", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBC47200-8F3F-4969-AABA-39F4B1E4E263", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EB17629-2454-478B-8E1A-AC2D2FC2233C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A28B6DE9-D383-4CA2-94D5-4C9CFF95E01E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:*:*:*:*", "matchCriteriaId": "2534F0E2-C427-4514-AE51-26EB0872B519", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-9990xe:-:*:*:*:*:*:*:*", "matchCriteriaId": "743A5B98-E7DF-4A5D-9EB0-FFF9521DDD3D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_6405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "65FEB59A-6AF4-4E64-8BE9-437178D1EA0B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE118AB2-A2C4-452C-B9AD-DDEF65B5EC67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "5529CD96-F41E-4DD5-A9BE-6BDF84F9A9F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB78854-1E03-48F3-BC86-B0934641B47E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C96A17A-44EE-4FD0-9187-9BB9202AA9C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D6425C6-A338-42A0-B236-12B33147931D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF3F6453-51EF-4509-94CB-24E8ECFBAC5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "A263FA56-5F1F-4E91-A354-38648E130685", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D24E8214-881A-4C15-A544-FB3FD5D14DCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1EDE72E-3734-4FB5-BC77-B7C3838D41F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E07450B-D81B-474D-9150-C9D8A62D44A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A892B60-7FD3-41A6-9997-586B76757416", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4701D592-F06C-4713-9736-19DB130B5E2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3E6063A-23C9-4845-B575-5D330B6C68F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D50C73A4-D52E-4560-B725-61F416E18505", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "25570E2C-BBE9-402F-9631-FA5014767CE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*", "matchCriteriaId": "D59D57C2-CFB5-486E-A340-E63C7D7A8B6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*", "matchCriteriaId": "E687CADE-6E49-4284-BD41-6CA2FDD846FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A7540F0-7EB8-4F64-AA31-9AF3D79BEC46", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1712tr:-:*:*:*:*:*:*:*", "matchCriteriaId": "402EF7E8-CED7-4B36-A137-56E41AFBC458", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1715ter:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AE2C11F-FA32-485B-9197-B7A765657BE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1732te:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BFE6CA5-1E1F-4FD2-A476-4A82D3A5559E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1735tr:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CA15D3D-58C3-4D28-AB3E-768619D54C02", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1746ter:-:*:*:*:*:*:*:*", "matchCriteriaId": "83985A6C-2899-4590-B67D-355725999FA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*", "matchCriteriaId": "B804174C-53DB-4641-BD26-3ECDD9FBD638", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FB59E56-9FBE-4D10-AFC0-03E0ED0A4120", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3930A6D-64DC-4953-AD7E-EED0C48B048E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B10FCF1-F496-4166-9162-41012C4D2B16", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACAAD0F0-9182-46EF-8399-C04FB472BE6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCADFB25-DCBB-4901-9E4D-132ED49C7F26", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0327393-DB2A-455B-8E20-3EDB3766CDA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2E00698-8A08-433F-8852-8EDC422A53D8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A25BD7C-F01B-49F6-8DB0-2F8B976AC9E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*", "matchCriteriaId": "4925D0EA-D524-432F-8417-892BB8C3DDFA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3757F7B-4283-4ABF-974B-59E4E2358035", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*", "matchCriteriaId": "93D86199-5CF3-4E7A-8295-50F958EA4B4C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "122BD094-E815-4081-B674-B71AC193BE0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2712t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9041FB35-0CA5-4264-90D4-9809D915D5DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2733nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A700EE1-31E2-4FED-9153-4320A1E87E55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2752ter:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DE2FE80-7E5F-4D16-B378-CBB536BC4CEC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2775te:-:*:*:*:*:*:*:*", "matchCriteriaId": "F52876D9-6F3D-42D0-AE01-CD54BA54C11F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2796te:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4D262B4-CA46-4F29-87CE-7ABE1E160D45", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2104g:-:*:*:*:*:*:*:*", "matchCriteriaId": "921B163F-7696-4C47-8FD5-1E2897471C22", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*", "matchCriteriaId": "43126A13-5931-4989-BEFD-E1A096F98D94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*", "matchCriteriaId": "342E0783-288A-4DB0-A657-29937903927C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4C40F91-138F-4396-9A6B-B969F6AC30B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*", "matchCriteriaId": "23CA9365-B1C4-4188-A9BF-19215AFF58A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4797D2E-1270-447B-BFE4-CC96D9F10D5B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA77EB3-6F11-43BC-8B59-84217AA73205", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0866F1A3-8B9C-4B5A-B30D-71B3465EC80A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*", "matchCriteriaId": "331B8F10-3A20-46A8-B960-3546271CF701", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE638E59-DF75-43B1-A6DC-10A838B05B00", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67B3834-E59E-47AF-A806-13A990E812B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*", "matchCriteriaId": "79214F8B-1090-4DCD-B1F4-0FF78FC29C4A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD176FB0-7427-4F2E-A969-72062BB3EF98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B278081F-F900-4581-9D10-B5A2ACD2E2C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*", "matchCriteriaId": "45689B37-5085-41B3-BA9D-F05FD07DF1FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7186EA5-448F-473A-8FC8-058FC823ACC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*", "matchCriteriaId": "C12F0C71-8F25-4C77-A3F3-1231AC53C0CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB179A6F-FED8-45FB-89C7-3B17D6F5EB21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD38AEA-979D-484B-82F0-0161BA39E9F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*", "matchCriteriaId": "780AB9F4-0C87-4528-B53A-69FBC4D87ADB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*", "matchCriteriaId": "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "00912C9C-D386-445E-B390-E96361ECDFA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*", "matchCriteriaId": "60B582A1-784C-4BE8-A0D5-706DE01D769E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*", "matchCriteriaId": "320597E9-6A2B-47E6-A33C-6B31A81902EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EA930BC-EF68-4AD5-AA1B-0659358028D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A8EA870-2228-4E81-A417-30E040A5C0E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*", "matchCriteriaId": "656D31B6-1E8D-4A44-9D7A-023051E7050A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*", "matchCriteriaId": "49EEE5AA-3867-4137-B165-5004C34C77B0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2A38417-1DB2-4C85-80D9-D3968BF7A83B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F74E9E4-F84C-4B7F-8A42-20EEC60986DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*", "matchCriteriaId": "74F99F83-A7E6-4AFD-BC42-7348EF6613AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A62A9F4-2B98-4F2D-9143-08D1689E38AC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FD06CB-F456-44BD-900B-06131DC68B6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9044310E-4DF9-47BA-9D05-C1405DC8CDB2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA881CDA-1C16-43F1-A7D5-69502512A21C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFD11A3F-A2D4-4B09-84D2-548F97268805", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E031BE7-87C6-4E4B-8988-020221ECAEE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "49C57129-0A27-4142-BF6E-68A558773573", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5EFEF14-4ECB-45C9-8911-01FD7B115D7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "333364EE-BF57-4217-9517-2C1B95B826CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F2476F2-6A8B-442F-B054-738F36613CE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BC9CEA2-C621-4DCF-B64C-5495D3208DB4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "A32F3CD6-6BA6-40E7-9580-3C1A455B3C99", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2559D24-F8AD-4202-A00D-F48D51A0940A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "37AF4F98-0672-4101-9825-57B0F64EDBEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "2231374F-222A-4BA3-B14D-F69860668F7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "31BF874F-B640-4A18-AC92-F0E16AB7E1C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "542BC61B-1EA3-4C42-BB99-C9C67EE82F7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA12E60-4B0A-4723-8A02-3115494CD1DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*", "matchCriteriaId": "070C20AB-66F2-4EE2-8134-5E40DBB9B9E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CA49CF7-C6BE-4337-A0A8-A603D8955EE9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C8F7F6B-847A-479D-B6B1-BBA331D06DE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C375A9D-C7CE-49A6-B08D-9CAB22E16D32", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*", "matchCriteriaId": "E06531E6-126A-4FBB-BEBB-F9023C4738F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*", "matchCriteriaId": "93B8CDF0-1489-4E4C-B004-A22E06FC10D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6ACF161-472E-4088-85C2-5940C9C88D45", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E0B94F6-EC15-4C12-8BA5-CC6602A7A725", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*", "matchCriteriaId": "067C65E5-5392-4DAF-A6BD-640D78C19CE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1647DAC-CED6-4DAF-8F82-A42D6D691DF0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*", "matchCriteriaId": "D93CC498-F558-4C2F-9E14-7897060CA9FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6839AE9B-9A8A-4312-80FC-0549C675A815", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E0E7358-1EC1-43DA-99B3-A2D6D57E0121", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*", "matchCriteriaId": "43808CCF-1EF0-41CE-983D-DD6BB775895E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*", "matchCriteriaId": "06F1CFD2-8F32-4CE8-9D9B-C65B332775B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BF1F73B-4736-40BC-9053-951B5BF1059E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDA47606-176C-4F6B-A316-4C536B63FA4E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*", "matchCriteriaId": "76D48CFC-1322-4C53-8B53-88E7ACC724BE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F6456D0-32AE-44A9-9F63-AD64B5E49182", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "38EA99F9-22C2-47ED-9DDD-928E19C4C51E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F8867B2-F297-4D30-AD43-77B0F67FAE3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*", "matchCriteriaId": "178345A5-9A38-4C8F-B3BB-430276FA4998", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*", "matchCriteriaId": "831A7D63-4638-480C-94CB-ED06613BA75C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*", "matchCriteriaId": "178D9E36-79EC-4672-8E46-0FD6597CA1CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*", "matchCriteriaId": "EED0D492-ADAB-41ED-A283-024D3CED441F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BBB5A97-EA4F-454C-819C-DE1CE7018E7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9733E69-E7CF-444C-B72C-AC8E5DEF2449", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FD24563-9157-4DE1-95ED-D4E3E879219E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*", "matchCriteriaId": "F83F8602-6679-4B3C-BBDD-3BDB2B317F70", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CD3E45C-1943-42BA-9F6D-EA64D67BF954", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF7B4C84-1258-4F2F-B8A3-55353B3D13BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B27F755-4C38-4469-8A9D-C9266BDA53ED", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E21977E-7085-46C5-8E89-F952C2EBCE04", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB72D13B-5880-4CB2-8E80-CB6A39B5A302", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*", "matchCriteriaId": "02BCB7D2-4B68-4FF8-BFC9-06C39A708C62", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAF31FBF-20FB-4B8A-ADE1-E29BB8B8A702", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C8292CC-DACB-489A-BCB2-73DC2C6F944C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D83AEDF-2671-4278-8088-BA517192AB3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF72F37A-2F28-40E6-A84B-0E1DF63B1812", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EAE9CE6-DA95-40B0-AE65-656FA4603D1A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*", "matchCriteriaId": "5241B3E0-F968-4B16-8BF8-191C6F7B224A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EFB52DD-5B7D-45BA-B249-A134D1B9EBD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*", "matchCriteriaId": "B82FC910-F3AB-42BF-9740-EC09F0AC179D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BAE2B11-B0F5-415F-BD6B-E285EF9C9095", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BA58EFB-7672-4902-ABC1-65217AA617AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*", "matchCriteriaId": "96E2764D-7D6A-4CE0-A628-FFE966A6462F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D66D18C-17F2-4259-B1D8-7C63797A024C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*", "matchCriteriaId": "25C8DFB5-9D8B-4370-849A-DC061910E54F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B704835-1250-44E1-923C-5DE2F4DD25D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3D8E340-AE91-4F29-9F22-E0CE6718FC13", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*", "matchCriteriaId": "710DBCD5-788D-4140-AC16-EC6E126CFA66", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*", "matchCriteriaId": "A767EC83-AAED-4FEA-A35E-A503369FE4FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB1ACDED-85B4-4A11-BD03-8E1B9563B7F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6C4A47D-7F66-4ACC-9C69-0A355D46CDC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*", "matchCriteriaId": "489BD4AC-50C6-422B-A2B2-00A70E611114", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A551BBB-76CD-4C26-913F-B02C66E5D846", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*", "matchCriteriaId": "59C5122F-D822-4E71-A417-88EB51F1786B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*", "matchCriteriaId": "94A6DA7A-7C97-40E1-B31A-B92BB658C429", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*", "matchCriteriaId": "54AF128B-9984-4C91-B7F6-968DE376C3BE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "28B167F1-63FA-4C86-84AB-836ABF84E6E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*", "matchCriteriaId": "955420F9-3A3F-40E0-9940-DD43C5C78D62", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC4A437C-6C00-4729-91CC-D27EB3542633", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*", "matchCriteriaId": "74ED727D-B1A9-4F4B-92C7-3F00F3A80013", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2C24951-B3FA-48E6-AFAC-6CA0D2348230", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*", "matchCriteriaId": "185E8FBC-9EE9-472E-867B-0B0DEEECA13E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB3C00A0-C28A-46EB-853D-DAE3819399D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*", "matchCriteriaId": "0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0CAB607-87B2-49F4-9FAB-662D5EA3D11C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBE07EA7-4CDF-4038-A948-6AC126C7F6AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*", "matchCriteriaId": "06A2241C-37AE-41AE-A8D1-D9AB18CCE16D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB6DEAA1-3209-4B49-B931-43E8C1C5BE14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB15368B-21A1-429E-8B9C-A095C4E8BA67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA925F96-6DDD-4F71-BF13-710C8A89D860", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1D6444A-B9CF-4D70-A8A9-E6B57B6F13DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*", "matchCriteriaId": "05637A96-AF09-4FF5-A918-AB369AA2D1CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1CC27DB-11D4-412A-BC69-CF32A0CABCF8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FE9694-F0E7-4B45-82A1-065DA96B9794", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBC93757-5FD7-403D-B5ED-CC8793002352", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A7019D4-58E0-4B73-93B8-D3B0E86BF2D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DF8D8C4-29EA-4D09-87AB-A570403BA0E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*", "matchCriteriaId": "89421EC5-52E5-441F-AD3B-5C5E964F836D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA909754-B60A-4B30-AF42-4C8734E155AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBEFB056-0872-434B-9630-28A1AAEAD470", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*", "matchCriteriaId": "21A62CB9-FB01-45CB-9E10-E72D87C0E1F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD8EBFCC-AD76-4285-93BD-D14219C6EA5D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FF7E334-6DC7-44B5-A102-649A68300C80", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1B4F7FE-61A3-417A-BAA9-E686A76F3A94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DE4C87E-CB23-4804-9BBD-2533C5E1D6D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*", "matchCriteriaId": "7305838B-84CA-4BB8-A350-B2D2844F1041", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*", "matchCriteriaId": "D356D196-8AB0-4387-A644-C5E68174A60C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*", "matchCriteriaId": "89587A92-6234-40C3-83DB-F72319FFBC79", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*", "matchCriteriaId": "D557D68C-8279-4BFD-9EA6-17A83754B8FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ECA0BC9-1CA4-4B95-B98F-9098B2550309", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*", "matchCriteriaId": "1298CF87-124D-450B-928D-F39CCA2BAF42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF12820F-A2BE-44BF-A85D-7F4623898DAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*", "matchCriteriaId": "853DE44A-84C9-4959-865F-D538DF895647", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*", "matchCriteriaId": "13326C69-C160-482F-BF28-5425B57BE738", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F15EF0E-37CF-4944-8B6B-A82B4348CDC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*", "matchCriteriaId": "92D12220-840B-4397-889C-9649F34B7E25", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AB926B2-077B-4752-80EC-D39446115FCD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8C1D750-1FE9-40F8-BCB9-77D13C13906C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-11865mle:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BF12F06-D672-40BF-B7A6-1DA3711136F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*", "matchCriteriaId": "D59D80E8-5A2C-402F-8AE3-766ECEDA14F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*", "matchCriteriaId": "557E240A-6760-434E-9C3A-1E5E9129912D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B7565F3-5D41-4A1F-948B-1A55E3AD3EF8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*", "matchCriteriaId": "C71A52C1-1FBF-4730-8234-700F87D5E74D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B930DF9-C425-41AF-9736-0BD611C79CA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DF260A0-CDD8-4EE1-B3F4-73CD02FDCD11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C156433-48A3-4B2E-A8DB-AF1F09B2EFA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D78A1CFF-F05E-429C-A9AA-935078574A3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*", "matchCriteriaId": "E31FFECA-F663-4B59-9800-1C6A8BD84626", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3F194D4-9425-470E-B812-CD92B5C5A68A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E426811-F97D-42CE-B06D-41CDA84E1B55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F5F5950-C21F-4142-BA1E-E074FAF249F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2BC8A89-4CF3-473B-9251-9FA5FF8ADBD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*", "matchCriteriaId": "30EE6B10-84FC-4D9D-8F39-4B7000CC85AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AFDA5D5-F00F-40CC-B492-C433200A491C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BA7061E-E26C-4905-AB41-18267DD32821", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AFC055D-B249-4EB4-8A9F-BE4391A27505", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6F5DF76-FC10-4562-9AD9-6675F3D6CF3C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F91FC3-CF90-450D-9E71-4A301A997921", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*", "matchCriteriaId": "739731E7-F1BF-4D12-B103-E7F85B35307E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1C36BE-D4DC-4965-8106-EDA77BDB64DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*", "matchCriteriaId": "15B85362-44E5-4107-AC8A-29DEE2A7EEDD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*", "matchCriteriaId": "63293B85-A014-4F23-97EE-6CE3467FCB06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*", "matchCriteriaId": "708D6E00-A2E5-4B08-88E7-C872ACFC341D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CD8EE0E-2BA3-49DD-91D1-81AB67F16475", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC75E5CF-4241-45A8-AD45-1F7F077CEEA1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*", "matchCriteriaId": "D132291B-AADD-49E3-ADD6-333E1F1D8DFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ADF328B-D286-4C36-9F21-11A58D55D03A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6D23470-A702-426D-A63C-4F7BAC158762", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*", "matchCriteriaId": "750A77C5-1367-4E04-9ABF-1AB2D46C29C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1340A29-3428-4FAD-AA07-7F625915E34D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADA1FA19-A836-4D6A-8C2D-718ECE6866D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*", "matchCriteriaId": "3ECEBDB0-2E0A-416B-9737-82C1FC65A06C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*", "matchCriteriaId": "C39B6A99-7060-4011-8FA3-E5ABE5C02813", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF9E723E-1095-424E-A90D-380CA0D2795E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*", "matchCriteriaId": "35380FB9-90FF-405F-8E2E-01C1DD209540", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*", "matchCriteriaId": "2215D655-0EA9-4530-AB68-7B1C7360D692", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*", "matchCriteriaId": "020B6FED-EAE2-478C-8FF4-CB75F24E9A9D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE519C62-F5BB-461C-91EF-2979CD506C63", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*", "matchCriteriaId": "F693457C-3529-4E62-A672-1B862F235D0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2314_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3A19F40-FBAF-451B-8A6D-2F75FE6CD2EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2314:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A8EA870-2228-4E81-A417-30E040A5C0E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2324g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B0DCC8C-8A9A-4E9E-8689-69D8BF3A6648", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2324g:-:*:*:*:*:*:*:*", "matchCriteriaId": "656D31B6-1E8D-4A44-9D7A-023051E7050A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2334_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F4DA9EF-FAF2-438F-A292-4A58B9CFF9BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2334:-:*:*:*:*:*:*:*", "matchCriteriaId": "49EEE5AA-3867-4137-B165-5004C34C77B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2374g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0AB933A-A736-4A91-A0C9-9F8E7E61F123", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2374g:-:*:*:*:*:*:*:*", "matchCriteriaId": "74F99F83-A7E6-4AFD-BC42-7348EF6613AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2336_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A30F5B55-5425-4E05-A63C-058320C405AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2336:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2A38417-1DB2-4C85-80D9-D3968BF7A83B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2356g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBC38666-5DAD-448F-AD84-F26EF8138B21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2356g:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F74E9E4-F84C-4B7F-8A42-20EEC60986DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2386g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6E2FD90-23F4-4057-9C8C-1388F57FF2E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2386g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9044310E-4DF9-47BA-9D05-C1405DC8CDB2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2378_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9628A653-FD4B-4ED3-9DED-0AB15A265046", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2378:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A62A9F4-2B98-4F2D-9143-08D1689E38AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2378g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "274C5F94-E022-468B-9D30-AAE1E6211546", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2378g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FD06CB-F456-44BD-900B-06131DC68B6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2388g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6992509-A28B-49F7-B640-99407210D514", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2388g:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA881CDA-1C16-43F1-A7D5-69502512A21C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-1350_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "837530CC-4F7E-405B-88E8-41665ED448AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*", "matchCriteriaId": "E31FFECA-F663-4B59-9800-1C6A8BD84626", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-1350p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7F3E47E-163D-46D9-9D10-345E3747CCB6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3F194D4-9425-470E-B812-CD92B5C5A68A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-1370_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F6F50B2-80FE-4F05-AAFE-327D49EB6410", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E426811-F97D-42CE-B06D-41CDA84E1B55", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-1370p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D79A02F-EDAC-4125-A113-D5B7B52FAAE4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F5F5950-C21F-4142-BA1E-E074FAF249F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-1390t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAD398A0-6923-4B92-999D-2D6E62BCE665", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AFDA5D5-F00F-40CC-B492-C433200A491C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-1390_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "25A2A190-1B05-4971-9C1F-C199260F20EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2BC8A89-4CF3-473B-9251-9FA5FF8ADBD6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-1390p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B360114-92F9-42F4-ABB6-04C774EB8C70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*", "matchCriteriaId": "30EE6B10-84FC-4D9D-8F39-4B7000CC85AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-11900t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BFA38A-1059-4607-9CDC-F90DF7B90E8A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B903E2A0-EE73-4F13-AB26-8F5644462E94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-11900f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8ED61822-778A-41FE-A85D-A44D300F800C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D9BFA32-89B3-4E26-B980-2694B5378D8B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-11900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5AD8E5F-BA66-4628-ACF0-1891588C0DBC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CC25725-73F6-4948-B17A-A05E8978EB78", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-11900kf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB27F8F4-9A4B-49B4-9286-4D209FBA8961", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FECF6BE-2CED-4510-91C5-195686C9C421", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-11900k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "609B3A40-365A-42EE-B1A1-CF73CD41AFCE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2D04A37-79EE-467B-BD8A-0CA0BDD85F0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-11700t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1327CC4-7F1D-422F-BD11-099D2DC18352", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA18192E-7DBB-45BB-8568-CA7159AF8CE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-11700f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81805C4E-8192-4719-8F3C-6BD8C77E1B72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*", "matchCriteriaId": "3252CF19-9D1D-4A46-9C94-0E7255CDDD8C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-11700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "341575DD-4D03-44AC-8DE0-EA2A4768ABD1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF36D9CC-2FD8-4D08-8712-E625D4754613", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-11700kf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59C4FD26-557D-47F8-9E1C-D337ACDDF51B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "70B0C976-3B68-4647-909A-5D574D711C7D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-11700k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD2FF3DD-0986-4FB6-B17B-0AEFB0899672", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "E11C7F38-3313-4F6D-9D5D-E61C89E716B1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-11400t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2479723B-92C8-4C15-8766-DB7E1A911BD8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8640175-3BC2-4C7B-A5A3-51E5677EDECA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-11400f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1A36BB6-4EDD-4FF9-8786-C2A902C90C9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EA7E6D0-0ADA-4BE1-8273-69AB3DE3BA36", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-11400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04DC8DC6-15AF-4DB0-9A6A-4691FC9D86E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*", "matchCriteriaId": "092E3E45-5F58-412F-BAC9-C3B5290D8349", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-11500t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "720B135D-36C4-4204-A964-7D71DCFAAF29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7AFF680-DBC6-432E-A6DE-E7E7E4F2F26A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-11500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0362D029-F6A8-4A21-A31D-FDB51293928A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F6B5FC3-8E55-430A-A55A-AF541690C576", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-11600t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1089BC24-D092-41FE-8AA5-5742301B99AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3EC487F-B9A8-410F-AE1F-8D1B74BA77D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-11600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3622470-6979-4438-8BDF-549CC339D417", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B26C730-32FA-4D51-88FA-E724147147BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-11600kf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F24D3685-6DCA-40D0-8437-B0241A7597ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "E12D6BD2-7D32-4194-84D3-A0DE4B88BFF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-11600k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D00D974-CBA7-4362-AF2F-042D15AC9790", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFF7C5BF-E151-42DB-B0CF-E2589904C9A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g5900t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67AADF1-42B8-4E02-B216-6E234824A77A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g5900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D42AC70C-B114-4795-8769-D9AF12298456", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g5920_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBFEC288-B708-42F8-968C-4850FA7D088C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g5920:-:*:*:*:*:*:*:*", "matchCriteriaId": "153ABD9D-2C72-40C6-8DF9-3EB7D1D35B09", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g5900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C9DD991-2ADF-406A-964A-225266F17794", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "545649F6-46CA-40CB-8A00-5DD40F6A83B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g5925_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7BC4198-58BD-4F98-A556-4A7732F925A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g5925:-:*:*:*:*:*:*:*", "matchCriteriaId": "4036274A-CC6F-48B2-BF2E-DF51C4148B93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g5905t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9C04396-5B4B-48C1-8583-E8498192B8C7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g5905t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B773674-1DB0-41D8-A758-2AF49F4722D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g5905_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6A9EECB-9164-463D-9E19-C09D7B2ECF5D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g5905:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DEF520D-9427-4C5A-81F0-FCED5E2A8B99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g6500t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "179ADFED-5618-4A4B-9306-3407BEFD42C1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4701D592-F06C-4713-9736-19DB130B5E2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g6600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B72E6C4-CE98-42AF-B94B-448E753850AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "25570E2C-BBE9-402F-9631-FA5014767CE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g6400t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A021B608-3527-4DF6-8376-EA884CA9D38D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D24E8214-881A-4C15-A544-FB3FD5D14DCA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g6400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "45D3F2DA-3146-4756-9684-FD25DA4EF201", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "A263FA56-5F1F-4E91-A354-38648E130685", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g6500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E6DA337-417C-4D36-B6F5-E5E3F8D8A0D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A892B60-7FD3-41A6-9997-586B76757416", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g6605_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "881245CA-3A47-4AA5-A488-ADBBC3517FB2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*", "matchCriteriaId": "D59D57C2-CFB5-486E-A340-E63C7D7A8B6D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g6505t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9D60328-4630-4B3B-B9CF-1639B1187270", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D50C73A4-D52E-4560-B725-61F416E18505", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g6505_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF3F8EF8-E483-464C-BCCF-64B05F855024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3E6063A-23C9-4845-B575-5D330B6C68F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g6405_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72623E61-F326-44AE-ACAE-987315EBF543", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1EDE72E-3734-4FB5-BC77-B7C3838D41F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g6405t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8663D84E-1707-4021-B512-05AC2C5B1036", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E07450B-D81B-474D-9150-C9D8A62D44A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10100t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6BFE70F-8E5F-46C8-8675-3D5C114BF98A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BD11E86-B786-43C8-9B67-8F680CC30451", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7E2359B-38A9-4962-B819-1C438390BF81", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9CBE9-CF87-495B-8D80-5DDDCD2044B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10300t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE22EAE0-A356-4194-9287-FE70FCE16135", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "078DAE1F-8581-44FB-83EA-575685928C4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F33FA193-AA3B-439D-94D4-060172C7D371", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7AFC285-2248-45E7-9009-1402628F17E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10320_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6544E460-1B23-43B5-92A4-13CF61AF08A2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FD8BD84-B6F9-48D5-8903-2C56C12EFFEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10100f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "128AF2E8-0FDD-42FA-9F3A-7939E1D06389", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*", "matchCriteriaId": "614B1B4E-E1D7-417F-86D1-92F75D597E36", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10105_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBB644F0-D66B-4CE6-96A5-5AE895FC0315", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10305_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59FECACD-46EF-4DBE-ACA9-D0FB9311FCF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*", "matchCriteriaId": "887BEC29-AD0D-4BEB-B50B-F961629BBF23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10305t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BE6184E-9929-4F23-8834-9B0E15A4131D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*", "matchCriteriaId": "93859A03-DE41-4E7B-8646-93925ACBFC42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10105t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD66BFB8-0725-408E-B7C8-9EE2FB5EE1CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*", "matchCriteriaId": "984C7C7A-2F8E-4918-8526-64A080943E0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10325_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69A6228E-13A2-47CF-87B4-CB34A1FA4B10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*", "matchCriteriaId": "9877F278-641B-4F83-B420-AB4E1018EA9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10105f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A88A42CB-3AD3-4621-AA0D-F24636DA9903", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8B15567-BFEA-43BE-9817-98A1F5548541", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5E50D6E-C759-46F4-A794-5DD83E971BD4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "464587A0-9EAA-4DF5-AFEB-15F2FA9CD407", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "06ECE587-9DC0-4989-97AC-DD2B7EEAE7D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BF497A0-30BC-42A4-A000-C0D564D4872A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10400f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DA87ECA-F5EC-42A5-8A43-6D47242A2756", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3025301-52D3-43D7-B6AB-F3F0A5C882DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "150F855A-EC0D-483F-99A8-DDD33AAE1F92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2D116C4-698B-45BC-8622-87E142B37922", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10400t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "255A4636-57B9-491E-B213-02E3B4EFB6B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9466A6CC-8D69-4EB5-94E2-611297120462", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10500t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BC109D-F210-4BB0-80B1-BC877F322E9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "36836EB0-99DD-4217-9182-1E9FC5656C42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10600t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3548B071-7C6E-402D-8292-84E1400BDC07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DEFF6A7-0DE2-4BEE-80DC-BBAB259647AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10600kf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "21EAC0D6-D5E2-42D6-B105-BCF09C35BC09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B722E2A-1262-44FD-8F7C-F9A9A5C78744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10600k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79AA0B0A-19E2-4F4B-B1E1-09F4DFED737B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "1940F59A-67FD-45F9-9C78-51A50687628F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10505_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "388D5427-0439-4F89-9D80-3AEDB853B2CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C26205-C602-46F6-B611-424709325D6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFA2457A-D89A-4F3E-95D3-3C839F3C0365", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1978F85-5BA5-468E-B797-7FA7EB4F489D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10700t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D9D6D38-180E-4CD1-B6A6-765E67DF97B4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB33CC4F-9D51-4A11-B063-6E78F0D71555", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10700k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DD3DB08-E718-4A66-A1AC-B31FA97E42C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CC9312B-40A7-4D4A-A61C-3BA865C29F63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10700kf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E029771-4205-49E6-9635-E03A66F877FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EBECBE5-2BF0-4175-81CC-C6D054C819B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10700f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "95AC35A3-6F6D-4F61-872E-6E73F958449B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EB23D0C-D2BC-4E7F-94AF-CAF171A64307", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10900k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6428C73-6A64-4619-983F-3871B4CE1472", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B7AEF3-7A62-43B2-8F0C-70E5A2CDB29A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10900kf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "576C6801-0DBF-4D1C-B5CF-55E25BDFFD11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC44D69-AAAB-4524-9D12-F1A606D57831", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10900f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "97C04E06-708E-4103-9238-A7451189DBB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*", "matchCriteriaId": "B07609EB-E10B-4253-938E-81566036D81B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "19B82BF5-F105-4686-A352-6BDD7FB2DC57", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE06C64A-1610-4340-98CF-AC91258AB215", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10900t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "465D3B92-2BC3-4F0A-A792-564361B2A1EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D23D2887-1246-4EA4-B8B6-57BC7FB869E6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10850k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E412013-D537-4E86-AA5C-08016531405E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*", "matchCriteriaId": "39F9F143-0AB4-4302-82B8-B4EA790EB08D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_6405u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68E166EE-7DF9-442A-874D-4CBB6F54702C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE118AB2-A2C4-452C-B9AD-DDEF65B5EC67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10300h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F542B269-6281-47C4-86CE-72BC9180D90E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "403E8A3A-28C2-4329-BF31-1A530E317959", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10400h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E3F8BD6-027E-4A6A-B7FC-99443BC13A71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10200h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54D72A6E-AAEA-49A8-92D8-FFED7220E263", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10500h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2115591-782B-492C-9A43-1EF612309E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DCA6E61-F1C9-4629-9068-545B19CF95E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10750h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B232700-BC3E-49B0-9814-FB37958B6CBD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10875h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EA7D248-0833-44D6-81A6-FFD24E54AE80", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", "matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10850h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "215576B4-3ABA-4F65-8DA4-F07C1750C99B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10870h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EBEEB17-29AB-4F3A-A0CC-68386A315050", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", "matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10980hk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4648D9A9-4050-4753-A7B3-E56C0F7E22F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D264277-00CB-4FCC-ADAA-38536609D0F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10885h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8CF9E46-7F23-4910-B09C-E2BADDC793B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE73B0A0-E275-449D-8ADD-86AE188DE82A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-10885m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A10133C4-4B00-46C6-8DF4-EF9D887AAF9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*", "matchCriteriaId": "13326C69-C160-482F-BF28-5425B57BE738", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-10855m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "86B08AB6-818E-4860-A162-E7FB75844016", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*", "matchCriteriaId": "853DE44A-84C9-4959-865F-D538DF895647", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-1250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73E12A64-9DFD-4369-8BA0-935E93DEEE52", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*", "matchCriteriaId": "557E240A-6760-434E-9C3A-1E5E9129912D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-1290t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCBEE5B5-9D02-4FB8-8767-FD3F1CFE3BF3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D78A1CFF-F05E-429C-A9AA-935078574A3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-1250p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "09B6508A-1986-46D9-B0D4-F7CBF68A4CBB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B7565F3-5D41-4A1F-948B-1A55E3AD3EF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-1270_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13FD9F35-27BE-419E-91E6-626C2C403156", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*", "matchCriteriaId": "C71A52C1-1FBF-4730-8234-700F87D5E74D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-1270p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B0CBAA2-0A64-4FDF-92BB-65F223828CBC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B930DF9-C425-41AF-9736-0BD611C79CA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-1290_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A957AA0-A21B-4089-95BE-C1B83D80F79B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DF260A0-CDD8-4EE1-B3F4-73CD02FDCD11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-1290p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC5FBA5C-384E-4605-8501-D3A8DA5352C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C156433-48A3-4B2E-A8DB-AF1F09B2EFA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8063AB-7D2C-4005-863F-A8BD612B430B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC2ADBEF-CF97-410A-816B-F9D1E3BAF205", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D267F336-7023-4DA3-A481-0F6F8A44290C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A2CB2A8-F7A2-44ED-92C5-5EDF32AA9A0C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD9D4C3C-BD9C-4AF1-92BF-127D9A6B7B44", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA036BD6-38AF-4763-9B84-8CD7019BF262", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C3257F5-CA55-4F35-9D09-5B85253DE786", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBE70578-1EC4-4A02-95F7-5A23B76E1BEC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*", "matchCriteriaId": "5598510F-1057-4DB6-838C-8945FB6978DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-9700t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BF1493D-E866-4FA7-93A6-2461053A5C0A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-9700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC758216-672D-4F7B-8CF3-6433B06AA2FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-9700f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "199A5D61-EB42-4C3C-9344-4CA497358D7A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-9700f:-:*:*:*:*:*:*:*", "matchCriteriaId": "C289687E-4D0F-4F32-92A8-137B5D6AA3C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-9700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D6E7038-2BFF-4372-8D28-2C72017EADB6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-9700:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6D63DC7-0623-4777-86EC-06697FEBFD10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-9700kf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1163CF40-4D70-4965-8229-B102D754ECD2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-9700k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CCE2EBC-82FE-49AB-857B-403C7ACE5091", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9400t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FF61383-1558-4AE6-97ED-3B8A20667EEE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7950151-6BF6-4A80-9370-ED92B59635BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9400f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC4DDD41-51CD-40FF-BCB0-29D559C1CAD5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7E91B92-4DB7-4866-8370-C6F8616D3D81", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AA0AF35-BED8-41EC-831A-57CFA7A5F0D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC9F52F-6669-459A-A0A9-8F472E1F2761", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9500t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC225BE-FA97-41D2-AD32-5FE58C2DAB94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8A3281-8FB9-4695-A5BB-F33B5EB6EF2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9500f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "060B891D-A885-4BE5-B4C4-3384CBBF2B28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9500f:-:*:*:*:*:*:*:*", "matchCriteriaId": "24A5BA20-2193-4C17-BBDC-8615D9333D96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "443C4081-E238-4AF4-AABE-AB5489756333", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9500:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F7D93A-7C16-4189-ACF2-9B3760180FCE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9600t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8356AC2-3879-4E3C-B1CD-9B1EAF0761CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "43B9F540-DFCD-40B2-8DE2-9AE9D123A48F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB2ED2C7-D6E3-46F8-B1B3-8B4FB939B189", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9600:-:*:*:*:*:*:*:*", "matchCriteriaId": "26975700-3A56-4D17-ADDC-77CCE82A6C98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9600kf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79F5E016-5AB5-4DB5-BDB0-75AE14253413", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B176D141-26B0-477E-B2DB-2E48D6FB82AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-9600k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B26CE379-73B5-4E3C-B0B2-7550A3A670BC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1DFFFEB-CC63-4F51-8828-C5D4E0287264", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-9100t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD20B8F2-FCD6-454F-955F-9F59B140593C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-9100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D53FC6C0-C1B3-422F-BAFC-3B4CD0EB28B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-9100f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9E4F07F-B972-423F-BCFF-E27B3207B493", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-9100f:-:*:*:*:*:*:*:*", "matchCriteriaId": "53F1B439-37B2-4425-8359-D3C86CD76BBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-9100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77B8A8CC-9009-4CF0-894F-97079FD27796", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-9100:-:*:*:*:*:*:*:*", "matchCriteriaId": "89E9DCEC-6AFD-476F-93A1-E19BFC124BD9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-9300t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7474BC6-6D73-47B5-B7B4-AA6BBFFC36A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-9300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "85B0AC6F-52DC-4697-A29A-B4DE51B41D57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-9300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "196BA038-162F-4E30-8DE3-6FFB35102A1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-9300:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CA88723-29A0-4F7C-BED3-70E35F913384", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-9320_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "769E9A01-C94B-4254-8510-ABE32567E22D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-9320:-:*:*:*:*:*:*:*", "matchCriteriaId": "64206B12-9CB6-4E4F-9200-EE062693FC9E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-9350k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AC85FC5-274A-43B1-A9B6-245130812551", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-9350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "98752CBB-B870-4DA2-BF09-0A6A847E7F19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-9350kf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "777DB8E3-3958-40F0-BF2D-B319F9FA3795", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-9350kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AA7EEBF-ED6E-4838-ADAE-0D7BA4E65867", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8086k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A2FFBF5-FA4C-4213-BCBA-D129EC925466", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-8100f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7895865C-DBF8-4853-947D-61DA96B43851", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-8100f:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC411FF8-C702-4D37-8FD5-DE18D4C9B02F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g4900t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52ED8318-017D-4941-8D5C-B6CBB89B0B4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2129E439-63C1-4CBF-B39D-2941621AB454", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g4900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B0288C6-F7DD-4D0F-9C3E-0C0835FD5ED3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B801EF4-980C-40EF-84A8-4AA2D29CFB06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_g4920_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EB95463-05B4-4BCD-894E-3EFA944CB418", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*", "matchCriteriaId": "26E9CDAC-8C63-4F9A-B171-9E5E11E5313E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g5400t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6FF2583-34CA-4D67-8E8E-3E790EB00DD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB78854-1E03-48F3-BC86-B0934641B47E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g5500t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "11E57CFC-7A4F-42A3-9637-BF296CC7CB22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D6425C6-A338-42A0-B236-12B33147931D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g5400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D12EFB3F-E57A-49AB-83E4-48BFA59D3704", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "5529CD96-F41E-4DD5-A9BE-6BDF84F9A9F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g5500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB623CE2-3D25-46F6-B7E6-08825275D9E9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C96A17A-44EE-4FD0-9187-9BB9202AA9C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_gold_g5600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B73E3E-322B-4BCC-A1AF-AF9F763073F7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF3F6453-51EF-4509-94CB-24E8ECFBAC5E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-8100t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9147C908-0B5E-4CC4-BFDA-FDC8219494A2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-8300t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC25F057-A548-4E02-A464-8AE97B40A39D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-8100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6325AFF1-8B27-408C-ADC3-E1FA826A2B9B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-8300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30904062-0998-4D93-8F61-36C41BCD11F9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-8350k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F99AFDF6-1B9C-4F06-A827-F0C5052EA485", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8400t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A5BA9C-83FD-4E4F-8CC7-ABC317BC0F98", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8500t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "382FEC53-468F-41B4-A639-5875F6C62DD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8600t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD242386-919B-4B0C-A7C9-D045C0977FD5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4ECE37-14C8-4035-9410-F66AF586934D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F4B23DC-BB43-4BF2-B96A-3A531EC603C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*", "matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C5BEE28-D0F7-44F0-8B01-69EEF249FDBE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8600k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DB2544C-BD41-4316-BDAD-30B4DDF785EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8700t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E603DAD7-EC5F-42E9-B902-445599280DC2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "26584C5B-4599-42CF-9C43-91A7B382756B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8700k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48293B3F-0DE7-4100-9512-2D20FC437D12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2278gel_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F68C14E0-5711-4D18-B529-AA0EE3BDC99C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*", "matchCriteriaId": "60B582A1-784C-4BE8-A0D5-706DE01D769E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2278ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DFD79A0-2F24-484C-AD4A-D58B7414788E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "00912C9C-D386-445E-B390-E96361ECDFA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2226ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B13FD46-A3EA-4DBE-8123-CF2DB203C6F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2288g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3540784A-1B0B-41EE-AB66-A293AC400C39", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EA930BC-EF68-4AD5-AA1B-0659358028D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2286g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C562AA0-3A76-4223-A5E4-13B2898FBC43", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*", "matchCriteriaId": "320597E9-6A2B-47E6-A33C-6B31A81902EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2278g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C02909B-E06F-4786-ABB9-ACF5D9C5E4D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*", "matchCriteriaId": "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2276g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98D6031F-201E-4FF2-A233-BF4C96ECF4B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*", "matchCriteriaId": "780AB9F4-0C87-4528-B53A-69FBC4D87ADB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2274g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF1AC701-DF74-457B-8CB6-FA35E0E78F29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD38AEA-979D-484B-82F0-0161BA39E9F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2246g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1A528C2-662C-40B1-8C71-A5A4134A6314", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB179A6F-FED8-45FB-89C7-3B17D6F5EB21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2244g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F222C991-CA9F-48FB-AC22-D8F6B837F8D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*", "matchCriteriaId": "C12F0C71-8F25-4C77-A3F3-1231AC53C0CA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F40D7630-3069-4AF7-B2B9-9AFF96A43AC8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7186EA5-448F-473A-8FC8-058FC823ACC5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A0FA18-C2C0-4DA1-B7A4-6BA3B822DDE3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*", "matchCriteriaId": "45689B37-5085-41B3-BA9D-F05FD07DF1FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2226g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08DFA1D1-C133-4152-A66A-C70800905E17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B278081F-F900-4581-9D10-B5A2ACD2E2C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2224g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE808573-A9E6-4DFE-82E1-08546F5BF451", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD176FB0-7427-4F2E-A969-72062BB3EF98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C9C4CE2-F65F-41FE-947C-16AD1558D03B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*", "matchCriteriaId": "79214F8B-1090-4DCD-B1F4-0FF78FC29C4A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2186g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9EB59BF-2708-4C3C-BA60-F621E067D824", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67B3834-E59E-47AF-A806-13A990E812B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2176g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "87C478AE-F05C-42B4-BCB6-2F0A7FE4AC88", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE638E59-DF75-43B1-A6DC-10A838B05B00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2174g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA4ABBE1-EE80-4FED-BBA7-A552BE31A826", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*", "matchCriteriaId": "331B8F10-3A20-46A8-B960-3546271CF701", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2146g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B46B1D60-3FFC-4CE7-9AD0-F78B0D5D1DFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0866F1A3-8B9C-4B5A-B30D-71B3465EC80A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2144g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A73DA92B-919E-4F75-A4A7-54E7F892BB24", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA77EB3-6F11-43BC-8B59-84217AA73205", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1490C2DA-4627-4BAC-A505-E434A81FBDC6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4797D2E-1270-447B-BFE4-CC96D9F10D5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F005ED6-B7F6-45FE-8694-A09F0D1CB2E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*", "matchCriteriaId": "23CA9365-B1C4-4188-A9BF-19215AFF58A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2126g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B263A8AF-03E7-4B05-888B-3395A2B10BF4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4C40F91-138F-4396-9A6B-B969F6AC30B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2124g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A7C6423-2E99-41D6-AD38-17658F1B1D21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*", "matchCriteriaId": "342E0783-288A-4DB0-A657-29937903927C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA1C21E5-81FF-45EE-836B-E809C8F34440", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*", "matchCriteriaId": "43126A13-5931-4989-BEFD-E1A096F98D94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e-2104g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7DFFCB0-360D-4805-8472-16391178164D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e-2104g:-:*:*:*:*:*:*:*", "matchCriteriaId": "921B163F-7696-4C47-8FD5-1E2897471C22", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-8950hk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCB18769-9DDD-4321-B123-BFF81A02DA4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8557u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B60A1C2-D6E2-43B3-967C-746CDC2F96CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8569u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "942B77AD-CEA4-4A9F-B748-155916A4917A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8700b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C667DFE1-E66C-44BB-916F-0F1257B5289E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8750h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBB43D3B-BC91-46F1-840E-F6876095FAB9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8850h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBB14435-11E5-4F75-98BA-0A6D2E4818FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8257u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "444C585D-8DAD-4D4E-99CB-23B38A2F2561", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A205DBD9-A841-446A-8ED8-57989B806518", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8260u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CAAFA25-2328-4B29-8B4C-CAA34A3F07DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFEF82DB-59F7-4530-B3CC-3D417CD519B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8279u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F1036B8-CB05-4DC5-AB07-ACCC6351B9EF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*", "matchCriteriaId": "73DA1253-1652-417A-BE27-586EF8ED59F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8300h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E3236A7-F174-4A47-90B3-7E0457CB3455", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8400h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BDC571E-D4F4-4837-9462-781B9085DDA2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8400b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D1FEE69-E2FD-4F88-9D25-7CE3D53D1001", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*", "matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8500b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "495C794A-3EB2-4C2B-8312-65C1C70EFFAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-8100h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "792B6DC2-0EE1-486E-B44A-F0971C12B1DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-8100b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "05D96F9D-50ED-47B4-9DC9-1C6807C70129", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1501l_v6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D1273C6-1F76-4366-88A2-A3955CB1CE3D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "37AF4F98-0672-4101-9825-57B0F64EDBEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1501m_v6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD9BABD0-E0D7-4D9D-B998-0FB23612E7BF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "2231374F-222A-4BA3-B14D-F69860668F7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1505m_v6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EE48BFF-CCB4-423D-968C-013060E447E3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "542BC61B-1EA3-4C42-BB99-C9C67EE82F7D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1535m_v6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5111864-B660-4603-BC03-94A719C8D2EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA12E60-4B0A-4723-8A02-3115494CD1DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1505l_v6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C056C18D-457C-4216-8B91-84A4628DE44E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "31BF874F-B640-4A18-AC92-F0E16AB7E1C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1275_v6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6185880A-E648-46C3-B14E-42DB61113C59", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BC9CEA2-C621-4DCF-B64C-5495D3208DB4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1225_v6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C3714C5-F0F4-42F4-9F88-F8C6AD2DD68A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E031BE7-87C6-4E4B-8988-020221ECAEE7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1280_v6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "049600BA-A3FE-43FE-AEBE-CA1D0CFA33F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "A32F3CD6-6BA6-40E7-9580-3C1A455B3C99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1230_v6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3214D779-E335-4141-882F-CBB3A3317CDE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "49C57129-0A27-4142-BF6E-68A558773573", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1270_v6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "65F8523D-BA5F-4BD8-A15F-A49B12001986", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F2476F2-6A8B-442F-B054-738F36613CE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1245_v6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAE98CB9-14D8-4297-807B-33F9B376D37B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "333364EE-BF57-4217-9517-2C1B95B826CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1220_v6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A393CA-35AB-4F8D-9A33-9693905DA445", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFD11A3F-A2D4-4B09-84D2-548F97268805", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1240_v6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22B02BC8-A29C-48B9-B66C-2BD9C241DFD2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5EFEF14-4ECB-45C9-8911-01FD7B115D7B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_e3-1285_v6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "17F6A70D-4925-49A7-BFE9-A1B7F2CD6FF0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2559D24-F8AD-4202-A00D-F48D51A0940A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7640x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B17AA3-CBDF-4D97-B649-EA79975C0895", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*", "matchCriteriaId": "70B7093E-97DA-4BED-AE7C-87090B82E5E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7740x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1711418-C4F4-497C-9707-A09E1C07CAF0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E9EF2F2-750C-4CB7-9858-69D7FFA4EF31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8305g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CF5BB43-9A54-4F8F-86EB-04B56135F69A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8809g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53180F59-BE75-4A62-99ED-3602C025E388", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8709g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EEE5E85-132B-4C11-B2C1-3F1AFEE3BE5D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8705g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "88971837-5ED9-442C-BAF2-1C6C31105EB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8706g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9530B87C-B5C7-4EE6-BE29-A559BFE9EC18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7102e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBDB6650-46EC-4BB5-BE75-E9FC3459745E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*", "matchCriteriaId": "14C20D2A-CD26-4019-A266-AB4E89EBD2E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7100e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "75FB9C68-B6AE-4F99-9347-9A4DA063FEF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C17DCC3-9200-4198-B08D-EAD531B59995", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7442eq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB1CF02E-EFEB-4841-9E57-27E6874A25F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "44D7B5DF-716F-48E6-9445-BB56A620DEF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7440eq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08F70F59-FFE5-4A21-8299-B59C9FD2417B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6EACCCA-7ADB-40B8-87DD-A55313E5BB97", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7820eq_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C70D1724-ED58-4675-9A53-F7473D77638B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8C1205B-6AC7-4DB5-B247-2108511D9957", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7700t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "65ABD229-0EF3-44AC-AD87-6C42EF48BF2B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7700k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D3E61E4-8FE1-47CC-9A9C-1A4F17C11938", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "913BBEFF-49E7-42AF-A850-B49E5A12AB98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "988EDA03-EF3B-402F-B3B4-74BA32A1BCCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D901944-8E2B-41E5-BB82-CF1C97064711", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7600t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "66430AA1-841C-4204-8846-B2FBEFF4269A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B91585C-4BD7-475B-8AC8-1B813A698D77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7600k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3244927F-488B-4F7D-A616-02D26E64C88C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF705120-459D-49BA-BDCD-6AC38D95C820", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62D1D375-D4AE-4866-8472-30EBF2A6F057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7500t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52E5B70-12E0-4AA2-81E5-71BBBFA1D500", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "92E1FB35-EB0D-46D9-8B07-5B74CD56B36C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F3E6176-6F6D-4488-A03B-2BBF846ADC93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7400t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "01CD5DEE-86B0-4431-A542-603300A28DB3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "173C6F98-4022-4F40-A39A-D3D490CA6461", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7400_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84928CAE-996F-42F9-8CB2-E3BC13E3D448", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7350k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AE97A31-CFCC-43AA-9354-E7ACC2415211", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E86321B-B1BD-43B7-A7F5-05CABE35F40E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7340_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBA8589A-070E-4D74-89FA-B2D0B0BA8BBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7340:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C195F5C-9666-48C7-A1C0-43E189B17EEA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7320t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8A44B6-26FA-4859-B104-38544531E535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7320t:-:*:*:*:*:*:*:*", "matchCriteriaId": "00A6DEC8-14E3-4A0E-93A5-72BB607A9D18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7320_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CE3890B-D84E-4552-BCC5-9CB8C615BAD5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C51A38C-E4AE-46B9-ACE6-82E8F7B668D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7310t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59653CCD-D515-4F9F-93BC-A27071D7CF93", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7310t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D097A186-120C-49F7-94DB-A6FC3A42BDFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7300t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE031B88-677D-4EA4-A257-1641680E407E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CF355B2-A5D6-41CC-8404-2B61A594BA6D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7300_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B860BA95-FB11-4314-8EF7-9992F2F26C68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E3A734E-973B-4904-A905-51E438879B8F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7120t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "21E21EAE-6F4C-46E0-AB7C-44F22696CF22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7120t:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF5748B4-1ED9-49DD-9140-DC7B47A30BB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7120_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "883020AC-6EC5-4650-A8EA-4CACA1E11F09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6F9C441-D99C-4BA2-9269-83283507D7D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7101te_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A0A1AFB-4C82-4766-9C6A-E0C6B305E108", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB3ABEFE-11A5-4EC3-9537-F9C75A46FF65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7101e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A804AAD-8674-4492-9231-A6B7092B3E3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B6B298A-1480-41C2-BE7C-7291E7256D7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7100t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BBB9687-14B5-4F4E-B6A8-1524930E605E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7C8B4BA-24E8-4856-A2D9-BD2CE2C858AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9D0FC02-90FB-4C7D-88A6-CCC7FC7D96F9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC9F763B-B469-42DC-952F-48448121373F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A589B59-DB9C-427F-A28A-BFD01EC64997", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*", "matchCriteriaId": "43454510-4BE7-4CD1-960D-AE1B36EFBEA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10100y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73917CEB-A661-4E21-ADB5-2F7C545F937A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9963C9F-2D15-479A-A6C1-0C9863904B7E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D188A7A-9456-4535-A230-C16033A22F21", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "95BC9762-7F9A-483A-8C20-94481FD54000", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27E24442-6697-4D2D-9515-43E4370474B4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10810u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "85113D54-52E5-4372-8FD5-DC37DCBE9DA1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", "matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E7092CF-E482-4103-8AF9-A4C19238F9D5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10610u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C752B58-0750-4487-845B-9D657079BDED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D449326-502E-488D-9933-863B9CF997FC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10310u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D96CA5B1-ED93-4423-9C4C-EFCB3F63767A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6F3DE58-EC72-429F-A223-F2027D2828AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16920A34-D1CE-4F1A-BCF7-045E3B3AA9AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E80BB84A-3BF8-40E0-BB06-FD39C583B94B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", "matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:pentium_6405u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3408FB7-9D72-4FC2-8E54-5248B6722755", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_6405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "65FEB59A-6AF4-4E64-8BE9-437178D1EA0B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_5305u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2F8F8B9-FBAC-43AE-AB18-86FF0A2C5DA9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*", "matchCriteriaId": "39831D4E-743A-4C09-900F-24DDAB5D1B22", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:celeron_5205u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CBA2284-5890-4DA0-8B58-73CEC84A06D6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_5205u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFA35154-5EFD-4DF9-B099-6D752452A8D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-8145u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1100AAC2-5A94-4EF3-AB94-AB4B4085F109", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8265u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7001A74-CFF9-4CBB-A72B-E476C22ADF07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8365u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78DB74AB-9D98-40B0-9715-EF934125C228", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8565u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "50E893B9-92D2-4EA9-BDC6-0E73CA4EE484", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8665u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DF86B5D-4B93-4DFA-945E-723F49D90F1C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-8130u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DB32980-A87F-4AC6-9F1C-EA690582DECF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7020u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42CA9092-015E-4E75-9691-6EF0684B6933", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F2CA68-9EEA-421F-A92E-E7685EC010EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8350u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C1B41F0-B592-4E76-823E-847DDCC49859", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8250u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3C71C3D-D137-4302-8B35-3A2AA08DD92C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8650u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E4EBD70-06C1-4842-AF3E-970218816B18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8550u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F4E3B3E-5225-49ED-9159-4503DCDED473", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-8109u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "65CAE5F9-E9D5-4EE1-A02D-88707B118C1C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8269u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "07658CBC-A0FD-4A0F-BCBB-FC24115F7FDC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*", "matchCriteriaId": "70D9D4EE-A6CA-4C9F-905F-27570858B5FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8259u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2797768-C460-4901-99BE-148A7BADC020", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8559u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDE91A3E-B3EF-444F-A518-9027C1D65C01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7167u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBC24393-D20D-4BED-B327-2DC80876383B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F609E73-203F-45B9-9A3A-DC754B33860A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7360u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A308E6AF-16CB-4722-8318-94F7B1877535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADA681B4-37F8-4E2E-B73B-E0E17C66B754", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7287u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "419D32E2-D53C-4A81-8E9D-E79FD5D89B7B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*", "matchCriteriaId": "615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7267u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1737E9B0-D3DF-4B8A-8548-9B2CD94EB31F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF244D02-2B47-4884-8D70-37DFEB18CB60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7260u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "059D9645-5A07-44C5-A3B7-E8948D5F942A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFA6BB38-CDF8-46B0-9910-897AB7920D18", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7660u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBFC1253-B337-4F9B-855D-14A3F6AE7EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEE126ED-B743-4C6D-95FF-04F473A9A008", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7567u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77C3D738-944D-46A1-A542-32C96A021964", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7560u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A20E7888-D3A3-4A01-8328-71A81AA0A52A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A97ED15-D0C6-4B64-BA08-EE50A6990272", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-7100u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B1E75F-5225-4656-90EF-473D417D3051", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F059A42-0B43-4F79-BBAF-6ED05CFFE7EB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-7300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AB7E123-7871-4ED7-B76E-DC0151035B96", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2425FF8A-158C-40EE-BDBF-43E7641BC058", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E61BD341-9D1F-444C-A5C9-761994866ED2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D57834B-C031-4301-9839-7A32F13687EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_m3-8100y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E600C57D-AF4C-44F2-B1FB-E6B7D6CBE58F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8200y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9C3DCA2-6087-4286-A84A-6091149083C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8210y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "813C2CF3-2370-4FC9-86F1-85FA6597EDA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-8310y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CE8EAB7-E619-4140-9FF2-F01DD57DD286", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-8500y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2495E71F-8DE8-482E-A903-FA00E9A3C697", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-11155mle_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A4241FB-265F-4BE7-AA95-DA924B535F06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-11155mle:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F15EF0E-37CF-4944-8B6B-A82B4348CDC0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-11555mle_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "83162828-6EB2-4280-BB59-BAD590F25A05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-11555mle:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AB926B2-077B-4752-80EC-D39446115FCD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-11865mle_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "41E4628C-2547-4A53-BCB0-57D724D6F757", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-11865mle:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BF12F06-D672-40BF-B7A6-1DA3711136F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-11155mre_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8335E795-B5F3-470A-A15B-7AE82679C363", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-11155mre:-:*:*:*:*:*:*:*", "matchCriteriaId": "92D12220-840B-4397-889C-9649F34B7E25", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-11555mre_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B701BF7-BDC1-4EBC-9D56-048F7F3CF519", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-11555mre:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8C1D750-1FE9-40F8-BCB9-77D13C13906C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-11865mre_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "054F1EDC-1A86-410E-8B31-C560760E3B01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-11865mre:-:*:*:*:*:*:*:*", "matchCriteriaId": "D59D80E8-5A2C-402F-8AE3-766ECEDA14F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-1115g4e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "427C8E57-7E8B-4494-BE0E-E268AB2E4339", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*", "matchCriteriaId": "66BAF09D-8199-4579-B25A-E7C5177385E6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-1115gre_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "372ADB3F-1D20-442A-BCBE-87A41A71093D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "21EA30AA-713F-40AD-8C94-C1129198EE98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-11100he_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "90291EE5-655A-4298-AF37-919EA2BC37FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ABF9AEE-BE1C-40EF-9E5F-6F3641BA7CDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1145gre_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF5B827C-FA90-4435-8BC1-78362D79C289", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "B858B433-9DA0-4224-B94C-4962FB3A4138", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1145g7e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5A7B207-2E2C-47DC-9DFD-AF98BA108B4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*", "matchCriteriaId": "2910EB49-C9C6-4FC9-AA55-E7A0DAE28B93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-11500he_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F19AC344-835E-468B-9FB5-AB64A8A7E9F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-11500he:-:*:*:*:*:*:*:*", "matchCriteriaId": "0242C717-1C3F-4D9E-B068-F3102A40E6A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-1185g7e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E06CE46-0FF7-4831-87B6-FA1EB958CF94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*", "matchCriteriaId": "514B7B5E-D60D-464A-8CB0-273044FD2E09", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-1185gre_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5814CF55-8867-445E-BE1E-795006B0E306", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFB608EE-83AF-4192-93E1-7DDBA5F6A54C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-11850he_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C114D88-9FC8-4E43-8DD5-CA9618CDC9CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:*", "matchCriteriaId": "104B88E7-3B8F-4C4E-AD07-CAD1DCD7898B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-1115g4_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5CFB83C-DB26-4E52-AF8A-ADB6839BDD8F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F26C6DA-ED6B-444A-A63A-5155FCA4F0DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-1110g4_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34CD246D-3703-45A3-9CD2-17039A3B6C96", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C60AF0D-983D-454E-8940-209C471DC041", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-1120g4_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "36E4714A-A1CF-492C-8553-584A41CA5B83", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0D9B687-C3EE-4AF5-B9BE-7F0698D0F258", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-1125g4_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FE27BBD-F5C0-47FD-82CB-EF9763DF2866", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "114DF43C-839F-4066-AA30-8DC16B1D6687", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1130g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99645C51-90F3-4BDA-B9D4-AF747947481B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "158CC66D-32E5-4396-8E5D-4D90EE9AB62C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1135g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "36840EC4-CA42-40B5-8D0E-9CCE86B1A7E5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E84F0381-296A-408E-90D4-A316EE894A9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1145g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "844B344E-FA5C-4E66-A7F0-99993CD20ABC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "53D902B5-D135-4961-AED9-EA6DF06534B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1140g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C18C4D03-8736-48E6-9A91-5D71C2D95AB4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "7077CBF1-1FC8-4AF9-8B39-A15871FFD3CA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-11300h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69676C95-DB91-4FF2-B3F1-83E95FE84ED2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B40E9EC2-A8A6-4800-9F9E-B1237832D6F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-11260h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A331C0CA-06E5-4C46-91C4-1444780BC2DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BCD9C35-95D0-49E6-A9AC-E3AA8CD3F7B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-11400h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "427BE96A-0265-4979-8204-D555E601C519", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6FCAFC0-EEE2-43E4-AE90-1803588B5689", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-11500h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "490D9F4F-E489-4502-9194-2EDA44E70F07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*", "matchCriteriaId": "55568460-F318-48FB-90E4-55CBBAF13E59", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1155g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED643C3A-84A6-4ED0-8A6F-DE160DA93B8A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADB84973-3DAC-4458-A817-943302F5EFF7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-11320h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAE65B5E-60C0-47FD-B47A-12084959D291", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*", "matchCriteriaId": "55227C1C-D6CE-40AD-A5AA-7143E0A7AEF7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-1185g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "58712583-BA04-409D-A43D-AAE4CAC2DC64", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "12ADA9A2-6E64-4F17-B369-816639F0D3BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-1160g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A2043A3-466C-4142-9B2B-E63D6119ED09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-1165g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0E22745-5399-4CFD-8C4F-4DA52829DB2A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "5601E40A-96E1-4321-9682-055A1C607488", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-11375h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A80415BA-0D9A-4B96-9BDF-52A45DF82046", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5365D3B-1B0B-416D-ACFB-23843FD25EAF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-11370h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E5C4F73-01EC-4396-BDE2-1ACE9E9C8C23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*", "matchCriteriaId": "63719B1D-5A98-44E3-80D8-CF0B4C1C6F80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-1180g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF74D5F6-E3F3-40F5-823B-6814458CC541", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D28DF93B-E15D-47D3-B9C0-4AEE8B7FADD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-11850h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B89D3F9-351C-4A0D-BD11-1BBE5ABD6B7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F2DD1D-DB6F-44D1-BE3B-C798C09CC5F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-11800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B522B4F-03D8-4BB8-920E-7847298EF9ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2FDB568-5340-4DD8-B933-1CD64C370BD6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-1195g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98C17F5F-C6AE-4A7C-ACA0-1E8426ADC745", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "B807B5D8-BCDB-4398-8ADC-DBD1BD8D2B88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-11390h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9371D656-8665-4D04-93E6-CF9476546BED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*", "matchCriteriaId": "2556EF0A-B29F-4E9E-BB77-955CBC851EFA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-11600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3EE2586-A95C-4785-A264-39D30D4587E6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-11600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AD253CF-55F8-4350-AD79-6CB5526DEB57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-11900h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04975FEA-10AE-4E5A-A69D-553EE641D18C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*", "matchCriteriaId": "65E2A7C5-78D9-4F75-B8A2-5EB3ECEFBFF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-11980hk_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E89B3F38-F128-4173-9DF4-2B5CC5786648", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEF53EA8-8EB4-455C-A986-405DBB122D3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-11950h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99EB1527-0F25-422C-927D-0ED5924EA83D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*", "matchCriteriaId": "170B497C-05F2-46B5-92CD-ACF7C0BE1711", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-1060g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FED7ED67-CE89-4585-A146-E9B1C5CFFCCD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1030g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "646F0510-9532-466C-B43B-8E869384A52E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "365696BF-CE3D-4CE6-92A8-413DDE43774E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1030g4_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F74DD9E-0D1F-44B9-B3CB-7F85F4E540B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5F6F725-217C-48FF-86DD-E91A24156121", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-1000g4_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CDD752C-BE5E-4EE7-9541-CAE85E5E237A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF64D95C-653A-4864-A572-CD0A64B6CDF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-1000g1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "75921058-8E13-460F-9F74-AF9C21DF353A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-1068g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "90A0A6E3-0E0A-45F0-99B2-76017C8DDE20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-1068g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "322A1FD8-D2D3-4C24-B7A7-9D77EE933965", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F807F51-D647-4867-BBDA-17492346EB64", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "70EC3730-5825-422D-A728-D719F447E5E4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5071EBE4-CC92-4238-A23E-0213CB14E19A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "502AE808-A66F-4C02-A112-C4D682F3E13F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71EE1DE3-2F84-481A-BE31-7FDF4B4E76C7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2796te_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7F94D48-9C15-419F-AF50-82E28779E3BB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2796te:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4D262B4-CA46-4F29-87CE-7ABE1E160D45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2775te_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "96D4FC32-A3DA-4017-BECC-A6C37BC23F75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2775te:-:*:*:*:*:*:*:*", "matchCriteriaId": "F52876D9-6F3D-42D0-AE01-CD54BA54C11F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2752ter_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAF0E34D-4C06-4719-911A-F68D3ED657E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2752ter:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DE2FE80-7E5F-4D16-B378-CBB536BC4CEC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2733nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8DD7D5E-06CD-461A-8646-D6880E55FB2A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2733nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A700EE1-31E2-4FED-9153-4320A1E87E55", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2712t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA7A73C1-93CB-4FC8-8AD7-878627C287AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2712t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9041FB35-0CA5-4264-90D4-9809D915D5DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1746ter_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "45A33EA9-52AF-4914-BA2C-128603D37DB7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1746ter:-:*:*:*:*:*:*:*", "matchCriteriaId": "83985A6C-2899-4590-B67D-355725999FA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1735tr_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBDEA453-25AB-4641-9399-75192B24DD6D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1735tr:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CA15D3D-58C3-4D28-AB3E-768619D54C02", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1732te_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3F6AE4F-7E62-4A39-91AD-01A0F8B4FAF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1732te:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BFE6CA5-1E1F-4FD2-A476-4A82D3A5559E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1715ter_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "18CC8DBD-DD5A-4942-8491-210BBBB1E151", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1715ter:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AE2C11F-FA32-485B-9197-B7A765657BE6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1712tr_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98FA8094-67B3-422C-BC81-0F48389574F2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1712tr:-:*:*:*:*:*:*:*", "matchCriteriaId": "402EF7E8-CED7-4B36-A137-56E41AFBC458", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4310t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "156C3A26-74CB-4E99-AE8A-5B49424AB857", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ECA0BC9-1CA4-4B95-B98F-9098B2550309", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4310_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "678E18FE-BA19-4C86-ADF4-B776318F5D12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*", "matchCriteriaId": "D557D68C-8279-4BFD-9EA6-17A83754B8FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4314_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A58CEC44-41C3-44FA-A512-CE0B59F4B294", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*", "matchCriteriaId": "1298CF87-124D-450B-928D-F39CCA2BAF42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4316_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "446A632A-3B5E-490B-BF69-91190885380F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF12820F-A2BE-44BF-A85D-7F4623898DAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5315y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56862563-A4A5-4444-886D-E17C99A87142", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6839AE9B-9A8A-4312-80FC-0549C675A815", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5317_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "108518D9-D227-4F36-AE60-A56355D09622", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E0E7358-1EC1-43DA-99B3-A2D6D57E0121", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5320t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57BA492F-6F69-4598-AAF1-156BF98F34E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDA47606-176C-4F6B-A316-4C536B63FA4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5318y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8936DD6D-8039-4C46-BBC5-DD6A9F73A22E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*", "matchCriteriaId": "06F1CFD2-8F32-4CE8-9D9B-C65B332775B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6326_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB165123-26C6-4D9F-90DA-96112B628702", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3D8E340-AE91-4F29-9F22-E0CE6718FC13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6336y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CAA2CF5-808C-4157-A730-4301ED88B659", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*", "matchCriteriaId": "489BD4AC-50C6-422B-A2B2-00A70E611114", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6338t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3ECF4055-8163-47A2-9767-D4CC0D34CCDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A551BBB-76CD-4C26-913F-B02C66E5D846", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6330_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ABB6218-E238-41F2-B349-8AF4B8DE6898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB1ACDED-85B4-4A11-BD03-8E1B9563B7F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8380hl_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "896731D5-B752-49F5-BD8E-924385C0E6F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FE9694-F0E7-4B45-82A1-065DA96B9794", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8380h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0AA8576-BB5B-4128-92B3-50F839A5305B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1CC27DB-11D4-412A-BC69-CF32A0CABCF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8376hl_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3506304-A3F5-482B-BFB9-2C4E0D5D8D94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*", "matchCriteriaId": "05637A96-AF09-4FF5-A918-AB369AA2D1CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8376h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7428FE4A-4CA2-44AA-A412-81C6CC15FA04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1D6444A-B9CF-4D70-A8A9-E6B57B6F13DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8360hl_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22EB43AC-A091-4FF6-AE2D-FCCBFF49B7BD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA925F96-6DDD-4F71-BF13-710C8A89D860", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8360h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5D03D31-328A-4AD5-88D4-037A4317F61D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB15368B-21A1-429E-8B9C-A095C4E8BA67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8356h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3816252E-5421-442E-B8F3-C3A6B78F3B6E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB6DEAA1-3209-4B49-B931-43E8C1C5BE14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8354h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "574533C8-52E2-445A-8C57-2357892468EF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*", "matchCriteriaId": "06A2241C-37AE-41AE-A8D1-D9AB18CCE16D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8353h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9373835F-E7B5-442F-B11A-A46771B2D695", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBE07EA7-4CDF-4038-A948-6AC126C7F6AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6348h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EBE74D3-855F-4726-B265-A7DF93121A94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*", "matchCriteriaId": "59C5122F-D822-4E71-A417-88EB51F1786B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6330h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73DEE8C8-6216-47C1-A5E9-007842AF111D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6C4A47D-7F66-4ACC-9C69-0A355D46CDC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6328hl_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CAF6929-D8FE-4A6E-BB9F-E736680487B7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*", "matchCriteriaId": "A767EC83-AAED-4FEA-A35E-A503369FE4FB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6328h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BBC16B4-09E6-4122-9A7D-B2DD0C82C1BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*", "matchCriteriaId": "710DBCD5-788D-4140-AC16-EC6E126CFA66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5320h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D25841AF-F1D2-4862-826F-A194B843B86E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BF1F73B-4736-40BC-9053-951B5BF1059E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5318h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD8048C0-45BB-4532-BD0C-98C8723C7862", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*", "matchCriteriaId": "43808CCF-1EF0-41CE-983D-DD6BB775895E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BE472FC-4776-4FD1-AE36-3D9934A60BB4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93E897C-5D7B-4532-99D9-53192A1F776A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10920x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "470B28CA-4990-4AF8-9CF5-C2A1B037FFA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "33D0D618-D738-47F5-B7F7-C7F07972C893", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10940x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0F8E079-4941-4878-8DC3-4B74BD832724", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7A147E8-0778-49CE-92EF-ED1950138528", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-10980xe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF8583AC-0D66-466C-8024-15A520803534", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DFC6D19-9E02-4DE5-818F-931779A41F74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-2223_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D44FD82-EEBB-4388-B346-EB29B852F2EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*", "matchCriteriaId": "708D6E00-A2E5-4B08-88E7-C872ACFC341D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-2225_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32D47430-800D-43F5-AA6E-8852969BEFAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CD8EE0E-2BA3-49DD-91D1-81AB67F16475", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-2235_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E8852E4-C6AF-41D1-AF12-646B06C99600", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC75E5CF-4241-45A8-AD45-1F7F077CEEA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-2245_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42A4C795-500D-4B83-8DC5-327E011BA7E5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*", "matchCriteriaId": "D132291B-AADD-49E3-ADD6-333E1F1D8DFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-2255_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D0A0072-4ECD-4F88-8BA5-8BDB026F95B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ADF328B-D286-4C36-9F21-11A58D55D03A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-2265_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EF592A6-20F6-4220-8A9C-282F21EBCBF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6D23470-A702-426D-A63C-4F7BAC158762", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-2275_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "21189344-DC9C-4DAD-A33A-C0A9004BFD4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*", "matchCriteriaId": "750A77C5-1367-4E04-9ABF-1AB2D46C29C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-2295_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "87F3E569-3A87-4D31-B80A-E0FD74B25AFE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1340A29-3428-4FAD-AA07-7F625915E34D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-3223_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F619828-436D-4A0B-84F6-968893B96710", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADA1FA19-A836-4D6A-8C2D-718ECE6866D2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-3225_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D53DDDB1-DA94-4BC2-A934-4FFE55F0D1E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*", "matchCriteriaId": "3ECEBDB0-2E0A-416B-9737-82C1FC65A06C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-3235_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF1FA2A8-5000-4E03-B659-1112C4EAA1A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*", "matchCriteriaId": "C39B6A99-7060-4011-8FA3-E5ABE5C02813", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-3245_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A054F0CE-BD0C-4E56-9EBA-79A113FCA659", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF9E723E-1095-424E-A90D-380CA0D2795E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-3245m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "93849DA1-D6A5-4FA2-99F1-D8AD3B4DE8CE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*", "matchCriteriaId": "35380FB9-90FF-405F-8E2E-01C1DD209540", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-3265_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "97A8F5B9-B820-4E84-9863-FF734DE45B9E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*", "matchCriteriaId": "2215D655-0EA9-4530-AB68-7B1C7360D692", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-3265m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E23B39A-513F-4388-8F28-C711414E2BF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*", "matchCriteriaId": "020B6FED-EAE2-478C-8FF4-CB75F24E9A9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-3275_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "25CC3D78-CE53-4ADF-9D6B-73255508FCDA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE519C62-F5BB-461C-91EF-2979CD506C63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-3275m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2550330E-3A54-45BD-8B2F-8CD8D5561DA1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*", "matchCriteriaId": "F693457C-3529-4E62-A672-1B862F235D0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4216_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECEABF4C-68FE-4F14-B19B-0021312264E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4215r_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81852ED7-B78E-4AD1-9EDC-2D05B1A19E75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*", "matchCriteriaId": "89587A92-6234-40C3-83DB-F72319FFBC79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4215_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DD96F46-FB80-4E43-802B-2918F8650E3B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*", "matchCriteriaId": "D356D196-8AB0-4387-A644-C5E68174A60C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4214y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F0E4832-F8E5-4718-9358-C2E12049B771", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*", "matchCriteriaId": "7305838B-84CA-4BB8-A350-B2D2844F1041", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4214r_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B18D2DC-B97B-4197-8568-0B61288C2130", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DE4C87E-CB23-4804-9BBD-2533C5E1D6D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4214_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE33A02E-5A74-4F9B-BEBE-657F311C0387", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1B4F7FE-61A3-417A-BAA9-E686A76F3A94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4210t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C73A44-A2A9-4887-9EA8-9FE3F259783E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FF7E334-6DC7-44B5-A102-649A68300C80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4210r_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "84A2D53A-F40F-4EB0-B467-F3DA7C2A19E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD8EBFCC-AD76-4285-93BD-D14219C6EA5D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4210_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4784CBB2-276A-4742-92F6-0B5A35818B7B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*", "matchCriteriaId": "21A62CB9-FB01-45CB-9E10-E72D87C0E1F1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4209t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "644C5C4C-4257-4B9F-BE0C-01271B7BE6BD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBEFB056-0872-434B-9630-28A1AAEAD470", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4208_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E4E951A-EFE0-4976-BB67-B3996594C8D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA909754-B60A-4B30-AF42-4C8734E155AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_9282_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1D43F33-6733-49BE-87B2-14936230E5C0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*", "matchCriteriaId": "89421EC5-52E5-441F-AD3B-5C5E964F836D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_9242_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BFDF125-D5BD-40A6-8958-68C8F93C913F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DF8D8C4-29EA-4D09-87AB-A570403BA0E6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_9222_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E589B7B4-46E1-4426-A392-561AA0557D7D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A7019D4-58E0-4B73-93B8-D3B0E86BF2D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_9221_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CC474D2-B800-4EA0-A06F-FF69E52FC438", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBC93757-5FD7-403D-B5ED-CC8793002352", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8280l_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3829529-3EC5-4681-8902-AA581D9C2DDC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0CAB607-87B2-49F4-9FAB-662D5EA3D11C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8280_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC7F4E55-3AA3-40EC-8686-719F8474B3B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*", "matchCriteriaId": "0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8276l_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE0F5374-5A1A-4F56-BE42-E1D0F79ADD52", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB3C00A0-C28A-46EB-853D-DAE3819399D9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8276_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C35F1845-F913-43E2-AA05-F64FD0A6A736", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*", "matchCriteriaId": "185E8FBC-9EE9-472E-867B-0B0DEEECA13E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8270_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FC1E633-52B0-48EC-B8C4-3EA396F4CEAC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2C24951-B3FA-48E6-AFAC-6CA0D2348230", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8268_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F5D6779-B826-418F-812B-D1AD926E2D7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*", "matchCriteriaId": "74ED727D-B1A9-4F4B-92C7-3F00F3A80013", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8260y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "91BA9357-FDCE-4FE2-ACC1-065E6C0C6994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC4A437C-6C00-4729-91CC-D27EB3542633", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8260l_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7F2F3C4-28A2-4C3B-9136-B222797FCB0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*", "matchCriteriaId": "955420F9-3A3F-40E0-9940-DD43C5C78D62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8260_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D076A4C-EBFF-47CD-898C-E3D8595897DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "28B167F1-63FA-4C86-84AB-836ABF84E6E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8256_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "433CEBA3-2B72-404D-B561-957CEAC0A5B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*", "matchCriteriaId": "54AF128B-9984-4C91-B7F6-968DE376C3BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8253_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "823AD74E-785B-40C9-BA27-F988F5006263", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*", "matchCriteriaId": "94A6DA7A-7C97-40E1-B31A-B92BB658C429", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6262v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA876028-4021-4B58-94C2-89CEBD9CBA23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B704835-1250-44E1-923C-5DE2F4DD25D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6258r_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "46CB3931-D0C9-4760-8BD9-EF97D132407C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*", "matchCriteriaId": "25C8DFB5-9D8B-4370-849A-DC061910E54F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6256_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78598AED-2043-4D72-8F79-EBEED2DD0F1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D66D18C-17F2-4259-B1D8-7C63797A024C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6254_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7AF2819-C873-41A9-94F5-B8B34EBC9633", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*", "matchCriteriaId": "96E2764D-7D6A-4CE0-A628-FFE966A6462F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6252n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9FC9FFD-4D81-431D-BAA9-C112CD0BA3D7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BA58EFB-7672-4902-ABC1-65217AA617AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6252_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "761A4FF6-04FA-4DF4-AD51-58DA0211BA1C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BAE2B11-B0F5-415F-BD6B-E285EF9C9095", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6250l_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D69A1C2-12F3-47A0-8E88-EFE0E078E775", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*", "matchCriteriaId": "B82FC910-F3AB-42BF-9740-EC09F0AC179D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6250_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1511C172-F603-4A7E-9F5F-89140DFD59BD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EFB52DD-5B7D-45BA-B249-A134D1B9EBD3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6248r_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C1AA0F9-9364-402A-8C51-8E7DF5DA6272", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*", "matchCriteriaId": "5241B3E0-F968-4B16-8BF8-191C6F7B224A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6248_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "24EEECD1-018A-47FB-8CDA-6786864994B8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6246r_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0DC18457-A9BF-41F2-B00C-200FE3242A8F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EAE9CE6-DA95-40B0-AE65-656FA4603D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6246_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAC462EF-264D-4365-A965-0BCE9C687496", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6244_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "67B0B7EA-DBC1-4E02-A33E-7180FAB684F6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF72F37A-2F28-40E6-A84B-0E1DF63B1812", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6242r_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "587D2CC9-5C1C-4A43-9959-6EB248A50C28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D83AEDF-2671-4278-8088-BA517192AB3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6242_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "262ED175-6056-4FD6-840C-F4523A96677D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C8292CC-DACB-489A-BCB2-73DC2C6F944C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6240y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "19C76503-5F56-4C2B-8973-A3F94B1345DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6240r_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53041E95-27E1-4C42-A2C7-775E9168E3E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAF31FBF-20FB-4B8A-ADE1-E29BB8B8A702", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6240l_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E317001-0126-4B64-85AE-04AEC9954085", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*", "matchCriteriaId": "02BCB7D2-4B68-4FF8-BFC9-06C39A708C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6240_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "215608D2-0F48-4E32-963A-2DFE74A84557", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB72D13B-5880-4CB2-8E80-CB6A39B5A302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6238t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B880E026-665A-4519-87D4-4DCA08977033", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E21977E-7085-46C5-8E89-F952C2EBCE04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6238r_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E1DF8BD-E11C-4DFA-BE21-9BAE1FAFFC3B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6238r:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B27F755-4C38-4469-8A9D-C9266BDA53ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6238l_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69C5FB6D-C652-4743-84F0-D7BB55F2733F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF7B4C84-1258-4F2F-B8A3-55353B3D13BA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6238_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B51741B-1976-4998-B5DC-5AE1D62F6864", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CD3E45C-1943-42BA-9F6D-EA64D67BF954", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6234_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "19031868-9913-4170-9F69-C5582CC4C2E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*", "matchCriteriaId": "F83F8602-6679-4B3C-BBDD-3BDB2B317F70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6230t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EF270B2-06F6-4726-B01D-867A8F584810", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FD24563-9157-4DE1-95ED-D4E3E879219E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6230r_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B63F951-1E03-4768-9730-E7C71EE30E68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9733E69-E7CF-444C-B72C-AC8E5DEF2449", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6230n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0BF2AEF-5988-416A-B8C3-CB0919562B2B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BBB5A97-EA4F-454C-819C-DE1CE7018E7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6230_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C0E2164-CFCA-4236-A6AD-74484E387639", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*", "matchCriteriaId": "EED0D492-ADAB-41ED-A283-024D3CED441F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6226r_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D281AE19-C422-4F3B-919D-86E8B3F33F5B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*", "matchCriteriaId": "178D9E36-79EC-4672-8E46-0FD6597CA1CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6226_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A19FF1B1-F380-4CE7-8C09-DEFF7ED86571", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*", "matchCriteriaId": "831A7D63-4638-480C-94CB-ED06613BA75C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6222v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "938EF635-E09B-448B-A446-48890A209878", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*", "matchCriteriaId": "178345A5-9A38-4C8F-B3BB-430276FA4998", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6212u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D07C007-095A-4C11-A663-E38D624690D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F8867B2-F297-4D30-AD43-77B0F67FAE3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6210u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23AF1DF3-4044-47E7-9904-19CE0C9C5F2D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "38EA99F9-22C2-47ED-9DDD-928E19C4C51E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6209u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB40F57-7944-48CE-AFC6-9531D1E6B71C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F6456D0-32AE-44A9-9F63-AD64B5E49182", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6208u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC35FCDC-D376-4C2E-A658-FB6183E62A4D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*", "matchCriteriaId": "76D48CFC-1322-4C53-8B53-88E7ACC724BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5222_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AEC407A-5450-468F-B0CB-3028FF92468F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*", "matchCriteriaId": "D93CC498-F558-4C2F-9E14-7897060CA9FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5220t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8141C47E-4F0B-498E-8B18-264E90448C3B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1647DAC-CED6-4DAF-8F82-A42D6D691DF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5220s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "728C0EE8-D4D9-4426-9709-46505AF901D3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*", "matchCriteriaId": "067C65E5-5392-4DAF-A6BD-640D78C19CE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5220r_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE94BABB-5040-44CE-9BE3-CBC36C7F8CF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E0B94F6-EC15-4C12-8BA5-CC6602A7A725", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5220_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D162F8D-5836-4B52-A98B-EFB0289C1346", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6ACF161-472E-4088-85C2-5940C9C88D45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5218t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2411CF40-9A5F-4138-9111-84087A30050F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*", "matchCriteriaId": "93B8CDF0-1489-4E4C-B004-A22E06FC10D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5218r_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "223FECC1-93D0-40C0-A3DB-00603F652F63", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*", "matchCriteriaId": "E06531E6-126A-4FBB-BEBB-F9023C4738F1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5218n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F42D02F2-46A7-4359-94BC-7AE15EDE692D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5218b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "685FCDB3-F3FF-49C0-A26D-BFC081F2B78D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C375A9D-C7CE-49A6-B08D-9CAB22E16D32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5218_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CE780B7-B5C7-4475-87E8-DCD5AD3CF3DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C8F7F6B-847A-479D-B6B1-BBA331D06DE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5217_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28A6461C-C6F0-4A65-A86E-4420B1ACE6DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CA49CF7-C6BE-4337-A0A8-A603D8955EE9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5215l_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5AB911F-8825-4C97-9454-4F5DC5396E2A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*", "matchCriteriaId": "070C20AB-66F2-4EE2-8134-5E40DBB9B9E6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5215_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54686C14-25E6-4B4B-8ABA-FB115F6DDC3D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_bronze_3206r_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "260F6127-CF95-483E-A055-8AC00082A7BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A7540F0-7EB8-4F64-AA31-9AF3D79BEC46", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_bronze_3204_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1F371BC-529E-4787-ABE6-BE7BD937B04F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*", "matchCriteriaId": "E687CADE-6E49-4284-BD41-6CA2FDD846FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-9800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "027639C1-CA74-4F02-98E3-9C93E71DD7CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-9800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "57014B8E-5689-416B-9FE6-CE4A259E83C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16DE2C40-E8A3-418A-99B2-DD0D19814071", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "8580A81E-8BDE-4EB5-B830-6AA7550A25C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i7-7820x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F87618B-A8DF-46B0-880F-422CD2E52826", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7-7820x:-:*:*:*:*:*:*:*", "matchCriteriaId": "43756EB8-9F85-4499-99F0-43E69CA3F470", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9820x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "14E48F04-9B55-4162-BB28-07FFD3D5194D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D93CC48C-DCCB-442A-98D5-3165CCFAE7F4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E50CC66-0FC3-4825-B677-EBF34D6804B7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "655E770E-B9EE-4B08-B1EE-F393C7F68941", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9920x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "10A12922-9D6D-49E8-B9C6-DD74CD60FAFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBC47200-8F3F-4969-AABA-39F4B1E4E263", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9940x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "165E3D96-24EA-4F47-9692-30823C482BF0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EB17629-2454-478B-8E1A-AC2D2FC2233C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9960x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E86ACD76-A1A6-4B99-A521-38C706AF2EDF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A28B6DE9-D383-4CA2-94D5-4C9CFF95E01E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B82BAF85-06A9-4AEE-94D2-3CAF4607623E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:*:*:*:*", "matchCriteriaId": "2534F0E2-C427-4514-AE51-26EB0872B519", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-9990xe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAC00349-16DF-4FBD-A7B7-683F15825B6C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-9990xe:-:*:*:*:*:*:*:*", "matchCriteriaId": "743A5B98-E7DF-4A5D-9EB0-FFF9521DDD3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-7900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E714DE6-C7C7-44B9-B824-7FF85DA89A86", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B97260E-1D7A-45B5-AD86-EBF8CA259FE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-7920x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FED84E6-8E54-4630-9D95-FD2F8EDF4C89", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "58002875-D63D-4ABD-A8B7-DCAEB7E94AE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-7940x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E89BBE4-2243-4AF5-A63C-4BD45C62C446", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAC07903-D4B7-423F-9F79-7DF45E5350BB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-7960x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC956D6E-B4D0-44F0-BE83-6BCCE5ECC480", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FBC4FB5-7C2D-4E10-80BB-3951FFA3A6CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:core_i9-7980xe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE0A0913-B424-4E2B-A553-E40218BA1030", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA65F0A9-8BBE-4674-86B8-894484DC6C88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "811D3C20-42DC-4EAA-8B3F-A9B52CA79DF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "122BD094-E815-4081-B674-B71AC193BE0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBE8D02A-E569-499C-8EEB-273FE003364E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*", "matchCriteriaId": "93D86199-5CF3-4E7A-8295-50F958EA4B4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8B39E8-26E8-4ACE-88D6-0AAF4E2515C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3757F7B-4283-4ABF-974B-59E4E2358035", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "93409D2B-67E1-4410-9013-28E80B2525C1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*", "matchCriteriaId": "4925D0EA-D524-432F-8417-892BB8C3DDFA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "505E8798-0795-48A9-A55F-88CFF761843D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A25BD7C-F01B-49F6-8DB0-2F8B976AC9E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "61643FC4-4D2C-42A8-ADDB-1866A6F638DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2E00698-8A08-433F-8852-8EDC422A53D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B1F65EA-5A27-4700-98F1-B82DAAB3CCF4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0327393-DB2A-455B-8E20-3EDB3766CDA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35DE5D2A-7DCF-4398-8514-9BB88DC81B77", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCADFB25-DCBB-4901-9E4D-132ED49C7F26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "440D381D-D093-474C-8D22-AD610DEAB775", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACAAD0F0-9182-46EF-8399-C04FB472BE6F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A06D956-804A-47DE-85D2-26BEE9B3E313", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B10FCF1-F496-4166-9162-41012C4D2B16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2DF49A2-ED2E-44C3-8F0A-65E94807A4F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3930A6D-64DC-4953-AD7E-EED0C48B048E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81D4C607-D5EA-43C3-AE74-301BF0BA929F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FB59E56-9FBE-4D10-AFC0-03E0ED0A4120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA657873-A9B1-4513-8C60-29FAEC1E22F2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*", "matchCriteriaId": "B804174C-53DB-4641-BD26-3ECDD9FBD638", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-2195_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "965674C3-2816-498F-A2B8-E02847BB6CEB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*", "matchCriteriaId": "63293B85-A014-4F23-97EE-6CE3467FCB06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-2175_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D364DCDC-2A19-402A-8285-57E5E216374B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*", "matchCriteriaId": "15B85362-44E5-4107-AC8A-29DEE2A7EEDD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-2155_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B137CE46-56D3-484B-AD4B-E57C903DDEFE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1C36BE-D4DC-4965-8106-EDA77BDB64DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-2145_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7BAC9F6-35CE-4045-9F28-EE5A66C70282", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*", "matchCriteriaId": "739731E7-F1BF-4D12-B103-E7F85B35307E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-2135_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D231E6E8-6848-4914-B79F-FD44962FED2D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F91FC3-CF90-450D-9E71-4A301A997921", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-2133_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FF3665E-34AC-43A5-BC48-3365880097D6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6F5DF76-FC10-4562-9AD9-6675F3D6CF3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-2125_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8A62225-DD72-4BDD-9BEA-0DE3577D6743", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AFC055D-B249-4EB4-8A9F-BE4391A27505", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_w-2123_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CCF73F8-7B2E-4B92-AEE4-F59ED8CDD187", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BA7061E-E26C-4905-AB41-18267DD32821", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:all_flash_fabric-attached_storage_2820:-:*:*:*:*:*:*:*", "matchCriteriaId": "86D4732E-BBAC-4766-B043-5BEC4E09E60B", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:all_flash_fabric-attached_storage_500f:*:*:*:*:*:*:*:*", "matchCriteriaId": "2BF9C8E0-5DC7-4A06-A4E7-572172413724", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:all_flash_fabric-attached_storage_8300:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA68733C-FB68-4230-B237-C99AC979AD90", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:all_flash_fabric-attached_storage_8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "049791FD-C7CE-43E0-8B7B-363B49B40D4A", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:all_flash_fabric-attached_storage_9500:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F0356EC-7A33-4912-85AB-2B5245825171", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:all_flash_fabric-attached_storage_a250:*:*:*:*:*:*:*:*", "matchCriteriaId": "93A4B5AD-8266-46C8-A99E-1E4F302297C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:all_flash_fabric-attached_storage_a400:-:*:*:*:*:*:*:*", "matchCriteriaId": "2527D2C3-EDA7-4B8A-82AB-A4F20C731E2D", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:all_flash_fabric-attached_storage_a800:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0AD1854-175A-452E-8065-226EED6081CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:all_flash_fabric-attached_storage_a900:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EA8E628-71F4-47AB-BD33-1E4471291279", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:all_flash_fabric-attached_storage_c250:*:*:*:*:*:*:*:*", "matchCriteriaId": "C492DD50-7B02-4037-AEAD-765CF6B39963", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:all_flash_fabric-attached_storage_c400:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EB1A505-80E8-4D1F-BD51-2668626907F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:netapp:all_flash_fabric-attached_storage_c800:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E55F35F-EF8B-43D8-9ECF-76E158DB7973", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "La exposici\u00f3n de informaci\u00f3n a trav\u00e9s del estado microarquitect\u00f3nico tras la ejecuci\u00f3n transitoria en determinadas unidades de ejecuci\u00f3n vectorial de algunos procesadores Intel(R) puede permitir a un usuario autenticado la divulgaci\u00f3n potencial de informaci\u00f3n a trav\u00e9s del acceso local." } ], "id": "CVE-2022-40982", "lastModified": "2024-11-21T07:22:21.240", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "secure@intel.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-11T03:15:14.823", "references": [ { "source": "secure@intel.com", "tags": [ "Exploit", "Mitigation", "Vendor Advisory" ], "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/solutions/7027704" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://aws.amazon.com/security/security-bulletins/AWS-2023-007/" }, { "source": "secure@intel.com", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://downfall.page" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html" }, { "source": "secure@intel.com", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html" }, { "source": "secure@intel.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/" }, { "source": "secure@intel.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/" }, { "source": "secure@intel.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/" }, { "source": "secure@intel.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20230811-0001/" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5474" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5475" }, { "source": "secure@intel.com", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://xenbits.xen.org/xsa/advisory-435.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Vendor Advisory" ], "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://xenbits.xen.org/xsa/advisory-435.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/solutions/7027704" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://aws.amazon.com/security/security-bulletins/AWS-2023-007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Technical Description", "Third Party Advisory" ], "url": "https://downfall.page" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20230811-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5474" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5475" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://xenbits.xen.org/xsa/advisory-435.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-1342" } ], "source": "secure@intel.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:microcode:*:*:*:*:*:*:*:*", "matchCriteriaId": "59DDC2D1-D21B-4CD3-87A0-3AF07336E504", "versionEndExcluding": "20230808", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*", "matchCriteriaId": "404409CA-326B-425D-A4E5-1A3C8CC45344", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA5E65D0-6DB9-41D2-9721-8F1232D8155F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*", "matchCriteriaId": "46066C5B-DB48-4B83-9E5E-3809D3F7FED2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4BAE58B-C0D2-466A-88C1-47D2A81E9D7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99D4F6F-5874-4F5D-91FD-E265DCE86667", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*", "matchCriteriaId": "47DB082B-E169-4BE0-81DC-B2A7219C4DA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FA0A03C-21BB-4C5D-85B3-FF579F34E82C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD387ADD-02CA-4154-BF86-0DBE664FE5F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAB6FBF0-14B5-4DDC-BEC2-16535679B0C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*", "matchCriteriaId": "74F2A5C9-C593-4C42-A47E-F563C4696137", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA7576BD-43FE-44D2-A665-F78BDA4D964D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDA12CAD-F622-4F14-8847-AFD8DC250B40", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA062554-DBBC-4215-9705-1ADA545B5887", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCCDD79D-80C4-4A52-94F6-F30237AE0C53", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC6E2595-D9E7-46D6-99C8-336DEB1B4020", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*", "matchCriteriaId": "829702E9-C0EB-4E4B-A979-41A2235B182B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A84814F-B070-45B0-ABC2-1BAAA212EFD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9BD8917-5BEA-491C-B6E8-486FF957A876", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*", "matchCriteriaId": "B897D23E-1BC1-4FBB-AD00-422413C1749C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5C50FBC-6933-4E98-82B9-A70B1C836ED8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F8AD4D2-D48B-4F53-A0BA-A90E5A970832", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*", "matchCriteriaId": "971C6442-6546-440B-AD74-44A5BB527D11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F4B6C48-261B-4B0E-BA2A-7E3060D01F93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*", "matchCriteriaId": "41FC8B26-7611-45B6-A37D-DF7025E2E92D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*", "matchCriteriaId": "543DB437-425F-4FF7-BDBD-FB5CC17E0056", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E8DD28-EC33-489F-A71C-2AEACFB16FC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*", "matchCriteriaId": "84B97F2B-A3D1-48A3-9FB7-755191FDD720", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*", "matchCriteriaId": "10FD9FEF-2186-4416-93B7-B743657412A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*", "matchCriteriaId": "38161238-5D40-485F-B0D2-D7621EC317D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BE4E4AC-4E1D-4F86-A8E8-8053EE1B974E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1702:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDCD14ED-39BC-41FF-A4F3-E902102A498A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1712tr:-:*:*:*:*:*:*:*", "matchCriteriaId": "402EF7E8-CED7-4B36-A137-56E41AFBC458", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1713nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E026CF9-9BC1-442E-B4B9-0B3D9D3215D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1713nte:-:*:*:*:*:*:*:*", "matchCriteriaId": "E50E841C-AE02-4C66-B3B2-3D4FB67A316E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1714:-:*:*:*:*:*:*:*", "matchCriteriaId": "A59F8F22-8335-407D-BB55-57E1B744E917", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1715ter:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AE2C11F-FA32-485B-9197-B7A765657BE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1718t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D2C8998-DA71-4448-9728-9BE4CE5B4605", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1722ne:-:*:*:*:*:*:*:*", "matchCriteriaId": "08C3D245-3779-45E3-A7BA-EEECE0050566", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1726:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E47F700-8066-42B0-B9A5-F32C98E10EFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1732te:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BFE6CA5-1E1F-4FD2-A476-4A82D3A5559E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1733nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9AA40C7-279B-41AD-95B4-22EC2BD4AF09", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1734nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "88337BE1-5776-4421-8159-676C717DBE75", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1735tr:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CA15D3D-58C3-4D28-AB3E-768619D54C02", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1736:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB104763-90D0-4F1D-8817-137F32E6DFC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1736nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "C85E2098-CC8B-463E-8F90-6EBD8681BC82", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1739:-:*:*:*:*:*:*:*", "matchCriteriaId": "06508661-9A5A-425A-B689-8BFBFA683F43", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1746ter:-:*:*:*:*:*:*:*", "matchCriteriaId": "83985A6C-2899-4590-B67D-355725999FA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1747nte:-:*:*:*:*:*:*:*", "matchCriteriaId": "605ABEDD-7999-4C5C-943A-082AFDD716AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1748te:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7F4109B-D582-43B4-A732-91EC9640718A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1749nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EDFCD67-A46B-49F8-95E1-9A2257977153", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*", "matchCriteriaId": "B804174C-53DB-4641-BD26-3ECDD9FBD638", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FB59E56-9FBE-4D10-AFC0-03E0ED0A4120", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3930A6D-64DC-4953-AD7E-EED0C48B048E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B10FCF1-F496-4166-9162-41012C4D2B16", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACAAD0F0-9182-46EF-8399-C04FB472BE6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCADFB25-DCBB-4901-9E4D-132ED49C7F26", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0327393-DB2A-455B-8E20-3EDB3766CDA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2E00698-8A08-433F-8852-8EDC422A53D8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A25BD7C-F01B-49F6-8DB0-2F8B976AC9E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*", "matchCriteriaId": "4925D0EA-D524-432F-8417-892BB8C3DDFA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3757F7B-4283-4ABF-974B-59E4E2358035", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*", "matchCriteriaId": "93D86199-5CF3-4E7A-8295-50F958EA4B4C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "122BD094-E815-4081-B674-B71AC193BE0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2712t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9041FB35-0CA5-4264-90D4-9809D915D5DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2733nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A700EE1-31E2-4FED-9153-4320A1E87E55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2738:-:*:*:*:*:*:*:*", "matchCriteriaId": "63EA65DF-ED91-42EC-9D25-3B8D3F6850BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2745nx:-:*:*:*:*:*:*:*", "matchCriteriaId": "16CCDB6A-55FF-40CA-9E3F-13C05498D1E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2752nte:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC2D28B3-8414-4B0C-B019-A6D49FB758AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2752ter:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DE2FE80-7E5F-4D16-B378-CBB536BC4CEC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2753nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C221A3-A803-4C6C-A540-1075D03456AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2757nx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAC1D26C-D51F-4221-9666-A733CD66B1BB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2766nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "D18251B2-6FE3-4E2F-B065-06A920DDA593", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2775te:-:*:*:*:*:*:*:*", "matchCriteriaId": "F52876D9-6F3D-42D0-AE01-CD54BA54C11F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2776nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "28D9C63D-4ED0-4113-B836-82A092A5DD52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2777nx:-:*:*:*:*:*:*:*", "matchCriteriaId": "097A3531-66D3-41A9-B78E-4195516E292F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2779:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE771CAC-29B0-4266-BFA2-B7F03889C5FA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2786nte:-:*:*:*:*:*:*:*", "matchCriteriaId": "309212DA-AE00-4668-93B9-4192953F386C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2795nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BCA3AC7-DF42-4E39-BEA4-5C99B23EF32E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2796nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "25873FF2-7D0E-4BE2-9DC9-5D78FFCC14E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2796te:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4D262B4-CA46-4F29-87CE-7ABE1E160D45", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2798nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFE2DA99-9170-4759-B46A-126FE2E06CD5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2798nx:-:*:*:*:*:*:*:*", "matchCriteriaId": "9082A31D-6C60-48D8-8975-35DCC132C932", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2799:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0A7E0BB-9CDE-4179-8093-A67C56F5DA32", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6839AE9B-9A8A-4312-80FC-0549C675A815", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E0E7358-1EC1-43DA-99B3-A2D6D57E0121", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*", "matchCriteriaId": "43808CCF-1EF0-41CE-983D-DD6BB775895E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2C5D3DE-5506-4F16-B7F9-5032A1277D23", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED598260-2A9B-46F7-AA85-0DA97DA0D42D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*", "matchCriteriaId": "06F1CFD2-8F32-4CE8-9D9B-C65B332775B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DD98889-58A1-4A5A-B79A-B2DA9EDA63DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BF1F73B-4736-40BC-9053-951B5BF1059E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDA47606-176C-4F6B-A316-4C536B63FA4E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF7D9572-8D03-4D54-B0E1-C0A3F3F90FCF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE3CA224-B5DE-4451-9CF9-929ABEA242EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3D8E340-AE91-4F29-9F22-E0CE6718FC13", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*", "matchCriteriaId": "710DBCD5-788D-4140-AC16-EC6E126CFA66", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*", "matchCriteriaId": "A767EC83-AAED-4FEA-A35E-A503369FE4FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB1ACDED-85B4-4A11-BD03-8E1B9563B7F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6C4A47D-7F66-4ACC-9C69-0A355D46CDC1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*", "matchCriteriaId": "20821868-F7D2-4132-8D63-98E1089DB46C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB9295A-8832-4670-B268-FBD0BC086447", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*", "matchCriteriaId": "489BD4AC-50C6-422B-A2B2-00A70E611114", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5694238-F4E5-4689-ADD2-67C25762ED92", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*", "matchCriteriaId": "A57D44C0-AA8D-46B0-8923-ADB312E3937F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A551BBB-76CD-4C26-913F-B02C66E5D846", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A4A44F2-68BF-4709-946B-C976DA3A9C7E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*", "matchCriteriaId": "038AC553-5523-4687-843D-6FEA7264EDEA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DE5D09C-3272-4810-9F41-97BDBBFE4160", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*", "matchCriteriaId": "59C5122F-D822-4E71-A417-88EB51F1786B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14C3438-B876-45B9-85F5-61354207AF8A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7C504C3-7EEE-4A0F-8589-19C1E806E690", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*", "matchCriteriaId": "5230F6AF-88CB-4EE2-B292-8B9A7217D10F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B45C39D-03E8-46C1-88DD-94E382F4A961", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF2DC691-025A-441E-AAC2-C8583F54733D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FB7EE6-6808-4879-A0A3-E85FE5CB37CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBE07EA7-4CDF-4038-A948-6AC126C7F6AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*", "matchCriteriaId": "06A2241C-37AE-41AE-A8D1-D9AB18CCE16D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB6DEAA1-3209-4B49-B931-43E8C1C5BE14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCE086F8-5C8B-4F0C-B53A-76BD4E67B678", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*", "matchCriteriaId": "00B21B5C-0FDE-4A8E-A9FC-5CF822A74B20", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB15368B-21A1-429E-8B9C-A095C4E8BA67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA925F96-6DDD-4F71-BF13-710C8A89D860", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E41414A-6B0B-4511-A9A1-7FF99DD25DB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*", "matchCriteriaId": "91EB66B4-8F1B-4F35-9371-17FB761997CB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBDFD1AF-2716-4C95-ADFF-79EFA915C286", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*", "matchCriteriaId": "5390A12B-80BD-4889-BF0F-95E65D10D037", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1D6444A-B9CF-4D70-A8A9-E6B57B6F13DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*", "matchCriteriaId": "05637A96-AF09-4FF5-A918-AB369AA2D1CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*", "matchCriteriaId": "33FA0279-D587-471E-8EC0-211F78DA4DFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1CC27DB-11D4-412A-BC69-CF32A0CABCF8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FE9694-F0E7-4B45-82A1-065DA96B9794", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB267830-FA6E-4C2E-8BBE-C3DA12A6A33D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*", "matchCriteriaId": "D557D68C-8279-4BFD-9EA6-17A83754B8FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ECA0BC9-1CA4-4B95-B98F-9098B2550309", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*", "matchCriteriaId": "1298CF87-124D-450B-928D-F39CCA2BAF42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF12820F-A2BE-44BF-A85D-7F4623898DAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2745nx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A0202E7-6562-4A86-9471-2A55D85BC409", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2745nx:-:*:*:*:*:*:*:*", "matchCriteriaId": "16CCDB6A-55FF-40CA-9E3F-13C05498D1E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2757nx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "696D4AF8-3FCD-42C1-AC05-410EAA6D33E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2757nx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAC1D26C-D51F-4221-9666-A733CD66B1BB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2777nx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "95782411-EDA2-4717-8F4E-0F5CA29E5580", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2777nx:-:*:*:*:*:*:*:*", "matchCriteriaId": "097A3531-66D3-41A9-B78E-4195516E292F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2798nx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "173C73F5-A95F-44F1-89F3-037D4BF1148F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2798nx:-:*:*:*:*:*:*:*", "matchCriteriaId": "9082A31D-6C60-48D8-8975-35DCC132C932", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEB01EA2-42BD-4546-96AA-0C3BFB161B92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1702:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDCD14ED-39BC-41FF-A4F3-E902102A498A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1712tr_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98FA8094-67B3-422C-BC81-0F48389574F2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1712tr:-:*:*:*:*:*:*:*", "matchCriteriaId": "402EF7E8-CED7-4B36-A137-56E41AFBC458", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1713nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED3D0D02-D877-4B0F-B875-3E5388852234", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1713nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E026CF9-9BC1-442E-B4B9-0B3D9D3215D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1713nte_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27E2FC7B-A614-4811-9EAC-F59A33E90CBC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1713nte:-:*:*:*:*:*:*:*", "matchCriteriaId": "E50E841C-AE02-4C66-B3B2-3D4FB67A316E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1714_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A28C2696-65C5-43FB-B1C8-CAD7E745259E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1714:-:*:*:*:*:*:*:*", "matchCriteriaId": "A59F8F22-8335-407D-BB55-57E1B744E917", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1715ter_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "18CC8DBD-DD5A-4942-8491-210BBBB1E151", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1715ter:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AE2C11F-FA32-485B-9197-B7A765657BE6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1718t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "07D6FAF1-ABC5-402F-9692-FA685AD5E7A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1718t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D2C8998-DA71-4448-9728-9BE4CE5B4605", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1722ne_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF2076F1-81FF-4225-9CDF-6E90C69C33C5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1722ne:-:*:*:*:*:*:*:*", "matchCriteriaId": "08C3D245-3779-45E3-A7BA-EEECE0050566", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1726_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6E8D6DE-31F0-4C7C-BDB5-C45B9C070487", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1726:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E47F700-8066-42B0-B9A5-F32C98E10EFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1732te_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3F6AE4F-7E62-4A39-91AD-01A0F8B4FAF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1732te:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BFE6CA5-1E1F-4FD2-A476-4A82D3A5559E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1733nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FCDA47F-4994-44CB-9511-E67423455565", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1733nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9AA40C7-279B-41AD-95B4-22EC2BD4AF09", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1734nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "200605AE-BE1B-4060-98F0-36C4D10C242E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1734nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "88337BE1-5776-4421-8159-676C717DBE75", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1735tr_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBDEA453-25AB-4641-9399-75192B24DD6D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1735tr:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CA15D3D-58C3-4D28-AB3E-768619D54C02", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1736_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99F63594-FB7E-4062-9A1E-F83DB1D4840D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1736:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB104763-90D0-4F1D-8817-137F32E6DFC7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1736nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CF0337D-4C2A-40F7-A644-63174A059E12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1736nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "C85E2098-CC8B-463E-8F90-6EBD8681BC82", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1739_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59A7CA06-92FA-4CEF-8952-9B74407C4305", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1739:-:*:*:*:*:*:*:*", "matchCriteriaId": "06508661-9A5A-425A-B689-8BFBFA683F43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1746ter_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "45A33EA9-52AF-4914-BA2C-128603D37DB7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1746ter:-:*:*:*:*:*:*:*", "matchCriteriaId": "83985A6C-2899-4590-B67D-355725999FA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1747nte_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABC67CAD-EB72-4077-AE23-2A7F68ADB5CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1747nte:-:*:*:*:*:*:*:*", "matchCriteriaId": "605ABEDD-7999-4C5C-943A-082AFDD716AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1748te_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "21436685-3B01-4AC3-ACA1-CFAF6DD50453", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1748te:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7F4109B-D582-43B4-A732-91EC9640718A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1749nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "58F8575E-7EA4-485E-AB5C-71537BB5C48C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1749nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EDFCD67-A46B-49F8-95E1-9A2257977153", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2712t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA7A73C1-93CB-4FC8-8AD7-878627C287AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2712t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9041FB35-0CA5-4264-90D4-9809D915D5DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2733nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8DD7D5E-06CD-461A-8646-D6880E55FB2A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2733nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A700EE1-31E2-4FED-9153-4320A1E87E55", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2738_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CBDAA12-47A6-499B-B1A7-A52240B2641B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2738:-:*:*:*:*:*:*:*", "matchCriteriaId": "63EA65DF-ED91-42EC-9D25-3B8D3F6850BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2752nte_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE1BF0F9-6EE2-4098-A2FC-18CB1296A439", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2752nte:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC2D28B3-8414-4B0C-B019-A6D49FB758AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2752ter_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAF0E34D-4C06-4719-911A-F68D3ED657E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2752ter:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DE2FE80-7E5F-4D16-B378-CBB536BC4CEC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2753nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1E4271A-0D0A-4D36-882B-17DC7898CE69", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2753nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C221A3-A803-4C6C-A540-1075D03456AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2766nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "708CC292-2179-44C0-A858-1E72E7F51B65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2766nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "D18251B2-6FE3-4E2F-B065-06A920DDA593", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2775te_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "96D4FC32-A3DA-4017-BECC-A6C37BC23F75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2775te:-:*:*:*:*:*:*:*", "matchCriteriaId": "F52876D9-6F3D-42D0-AE01-CD54BA54C11F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2776nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47BB8FA0-459E-43D9-9E27-1A97355BA3D3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2776nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "28D9C63D-4ED0-4113-B836-82A092A5DD52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2779_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A52D7CBD-EE40-4B44-8102-032E6E3626F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2779:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE771CAC-29B0-4266-BFA2-B7F03889C5FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2786nte_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F94C9EAF-50BD-4AE1-A1DB-1747BF763433", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2786nte:-:*:*:*:*:*:*:*", "matchCriteriaId": "309212DA-AE00-4668-93B9-4192953F386C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2795nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DECB51D2-6E1D-4801-88DF-734C49A2A31B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2795nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BCA3AC7-DF42-4E39-BEA4-5C99B23EF32E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2796nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECE053DC-0BC8-44B2-B621-C1B6DE15C08F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2796nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "25873FF2-7D0E-4BE2-9DC9-5D78FFCC14E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2796te_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7F94D48-9C15-419F-AF50-82E28779E3BB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2796te:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4D262B4-CA46-4F29-87CE-7ABE1E160D45", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2798nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C71F4D6E-C14A-406D-8BCA-0873F9D7EB4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2798nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFE2DA99-9170-4759-B46A-126FE2E06CD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2799_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A9311B6-8286-4F93-AFE8-C73CEBF7CF2B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2799:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0A7E0BB-9CDE-4179-8093-A67C56F5DA32", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "786C8BA5-A74D-46FD-8241-12934B6C26B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F4B6C48-261B-4B0E-BA2A-7E3060D01F93", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A905368-740B-48FB-8949-D212D637E5E5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*", "matchCriteriaId": "41FC8B26-7611-45B6-A37D-DF7025E2E92D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A0297E3-3D66-4174-97EE-832F5E1DC708", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*", "matchCriteriaId": "543DB437-425F-4FF7-BDBD-FB5CC17E0056", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0D72C6B-6F57-4D37-9363-E741E2931B8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E8DD28-EC33-489F-A71C-2AEACFB16FC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FAC3989-A0CA-465A-9DB9-3C29D617C8AE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*", "matchCriteriaId": "84B97F2B-A3D1-48A3-9FB7-755191FDD720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B94CF0F-0A7B-42D1-90AF-28A893DA85D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*", "matchCriteriaId": "10FD9FEF-2186-4416-93B7-B743657412A1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37012AFD-094E-4742-972F-AEEDDEE4105C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*", "matchCriteriaId": "38161238-5D40-485F-B0D2-D7621EC317D6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1653n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "394270FA-3A62-4778-9E38-70CF88B430DD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BE4E4AC-4E1D-4F86-A8E8-8053EE1B974E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2123it_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA657873-A9B1-4513-8C60-29FAEC1E22F2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*", "matchCriteriaId": "B804174C-53DB-4641-BD26-3ECDD9FBD638", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2141i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81D4C607-D5EA-43C3-AE74-301BF0BA929F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FB59E56-9FBE-4D10-AFC0-03E0ED0A4120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2142it_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2DF49A2-ED2E-44C3-8F0A-65E94807A4F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3930A6D-64DC-4953-AD7E-EED0C48B048E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2143it_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A06D956-804A-47DE-85D2-26BEE9B3E313", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B10FCF1-F496-4166-9162-41012C4D2B16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2145nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "440D381D-D093-474C-8D22-AD610DEAB775", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACAAD0F0-9182-46EF-8399-C04FB472BE6F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2146nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35DE5D2A-7DCF-4398-8514-9BB88DC81B77", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCADFB25-DCBB-4901-9E4D-132ED49C7F26", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2161i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B1F65EA-5A27-4700-98F1-B82DAAB3CCF4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0327393-DB2A-455B-8E20-3EDB3766CDA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2163it_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "61643FC4-4D2C-42A8-ADDB-1866A6F638DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2E00698-8A08-433F-8852-8EDC422A53D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2166nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "505E8798-0795-48A9-A55F-88CFF761843D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A25BD7C-F01B-49F6-8DB0-2F8B976AC9E4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2173it_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "93409D2B-67E1-4410-9013-28E80B2525C1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*", "matchCriteriaId": "4925D0EA-D524-432F-8417-892BB8C3DDFA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2177nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8B39E8-26E8-4ACE-88D6-0AAF4E2515C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3757F7B-4283-4ABF-974B-59E4E2358035", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2183it_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBE8D02A-E569-499C-8EEB-273FE003364E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*", "matchCriteriaId": "93D86199-5CF3-4E7A-8295-50F958EA4B4C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-2187nt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "811D3C20-42DC-4EAA-8B3F-A9B52CA79DF1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "122BD094-E815-4081-B674-B71AC193BE0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1513n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A869936B-3C49-4E13-A467-28CBA4178F40", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*", "matchCriteriaId": "404409CA-326B-425D-A4E5-1A3C8CC45344", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1523n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "712B36F5-6217-48BE-BA59-55F4AD9EACDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99D4F6F-5874-4F5D-91FD-E265DCE86667", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1533n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E45CD9C5-73E5-4D79-8E7C-D1A6FEA2EA9D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*", "matchCriteriaId": "74F2A5C9-C593-4C42-A47E-F563C4696137", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1543n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2577C819-3541-4AF5-87C1-C5ABA32AA709", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC6E2595-D9E7-46D6-99C8-336DEB1B4020", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1553n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FBCEF54-FC1D-4AE6-BD29-D7EE7F401180", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A84814F-B070-45B0-ABC2-1BAAA212EFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1529_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5872F0A-E0E2-419A-91B4-7A57268CCB25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD387ADD-02CA-4154-BF86-0DBE664FE5F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1539_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C57B1AE-7C36-4991-9835-8BA292598B51", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDA12CAD-F622-4F14-8847-AFD8DC250B40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1559_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3ECFE5B6-CD41-4DA1-BA61-2ED51BFE7F6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*", "matchCriteriaId": "B897D23E-1BC1-4FBB-AD00-422413C1749C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1557_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB5F33C5-18B0-43B4-A478-DB0478019E6D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9BD8917-5BEA-491C-B6E8-486FF957A876", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1567_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF024983-AAB6-4A1B-BB04-DA015D59F9DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5C50FBC-6933-4E98-82B9-A70B1C836ED8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1571_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BF2C02E-7C0D-4FB8-9D74-7CD9FAD32D2B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F8AD4D2-D48B-4F53-A0BA-A90E5A970832", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1577_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "540F4FFD-174C-4183-B208-9F7BA81E10A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*", "matchCriteriaId": "971C6442-6546-440B-AD74-44A5BB527D11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1518_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F54775F7-3AFF-4675-A686-A2EC357FEB85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA5E65D0-6DB9-41D2-9721-8F1232D8155F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1521_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF812F0E-DC8B-404D-ACE3-EA55FA189615", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4BAE58B-C0D2-466A-88C1-47D2A81E9D7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1527_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63259ADB-12AC-43B8-8399-0AD7A4CCF31C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*", "matchCriteriaId": "47DB082B-E169-4BE0-81DC-B2A7219C4DA3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1528_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC4D8719-A1B6-4641-9116-B3530AE77DEA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FA0A03C-21BB-4C5D-85B3-FF579F34E82C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1531_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE2F3B48-F432-473C-B7AA-881350F4ABC4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAB6FBF0-14B5-4DDC-BEC2-16535679B0C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1537_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "104244E0-C4D7-46A7-999C-07180274E8D8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA7576BD-43FE-44D2-A665-F78BDA4D964D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1541_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A3B14F2-3FE9-4435-A463-55C0DDF867B0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCCDD79D-80C4-4A52-94F6-F30237AE0C53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1548_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "243FB5C6-FA42-4148-AA32-8DA43D2A1669", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*", "matchCriteriaId": "829702E9-C0EB-4E4B-A979-41A2235B182B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1520_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A442CBEF-77FC-4D2C-99D7-EE8FA558D1AB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*", "matchCriteriaId": "46066C5B-DB48-4B83-9E5E-3809D3F7FED2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_d-1540_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B2DE391-0FFA-4F9E-8349-6E41267F74C1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA062554-DBBC-4215-9705-1ADA545B5887", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5315y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "56862563-A4A5-4444-886D-E17C99A87142", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5315y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6839AE9B-9A8A-4312-80FC-0549C675A815", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5317_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "108518D9-D227-4F36-AE60-A56355D09622", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5317:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E0E7358-1EC1-43DA-99B3-A2D6D57E0121", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5318n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B12E1696-DE9D-40B5-97F1-E9157AED4A7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5318n:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2C5D3DE-5506-4F16-B7F9-5032A1277D23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5318s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "315C9B38-2572-4B6A-A8AF-5D16553A3A30", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5318s:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED598260-2A9B-46F7-AA85-0DA97DA0D42D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5318y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8936DD6D-8039-4C46-BBC5-DD6A9F73A22E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5318y:-:*:*:*:*:*:*:*", "matchCriteriaId": "06F1CFD2-8F32-4CE8-9D9B-C65B332775B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5320_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48A5F3C2-DE31-48CC-A5DF-C7A9F9CD089A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5320:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DD98889-58A1-4A5A-B79A-B2DA9EDA63DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5320t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57BA492F-6F69-4598-AAF1-156BF98F34E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5320t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDA47606-176C-4F6B-A316-4C536B63FA4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6312u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A1C9968-0AD3-4E96-A721-6EA6C0BF6209", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6312u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF7D9572-8D03-4D54-B0E1-C0A3F3F90FCF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6314u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBA147EA-C92A-4255-948E-070616C09BC2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6314u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE3CA224-B5DE-4451-9CF9-929ABEA242EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6326_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB165123-26C6-4D9F-90DA-96112B628702", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6326:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3D8E340-AE91-4F29-9F22-E0CE6718FC13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6330_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ABB6218-E238-41F2-B349-8AF4B8DE6898", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6330:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB1ACDED-85B4-4A11-BD03-8E1B9563B7F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6330n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCC28C3D-B261-4554-B944-4C2E56EBE8EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6330n:-:*:*:*:*:*:*:*", "matchCriteriaId": "20821868-F7D2-4132-8D63-98E1089DB46C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6334_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEE9B3EC-2D8F-4167-9331-23EA64E2B631", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6334:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB9295A-8832-4670-B268-FBD0BC086447", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6336y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CAA2CF5-808C-4157-A730-4301ED88B659", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6336y:-:*:*:*:*:*:*:*", "matchCriteriaId": "489BD4AC-50C6-422B-A2B2-00A70E611114", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6338_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAF70C32-227B-4263-8BE8-73F876B3A465", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6338:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5694238-F4E5-4689-ADD2-67C25762ED92", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6338n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C3E8BF2-E5D5-490B-B3CE-EF47DD5E259A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6338n:-:*:*:*:*:*:*:*", "matchCriteriaId": "A57D44C0-AA8D-46B0-8923-ADB312E3937F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6338t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3ECF4055-8163-47A2-9767-D4CC0D34CCDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6338t:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A551BBB-76CD-4C26-913F-B02C66E5D846", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6342_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "03D1BED9-6173-4AC4-9453-9781EEC83E84", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6342:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A4A44F2-68BF-4709-946B-C976DA3A9C7E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6346_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6159A5FD-F734-4557-BA2A-214B2570C58E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6346:-:*:*:*:*:*:*:*", "matchCriteriaId": "038AC553-5523-4687-843D-6FEA7264EDEA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6348_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53075C98-C062-4338-BD9B-4013ED9E139C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6348:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DE5D09C-3272-4810-9F41-97BDBBFE4160", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6354_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F273BA3-F5B3-4970-8759-C5069845EAD5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6354:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14C3438-B876-45B9-85F5-61354207AF8A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8351n_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2ED7EDF-A382-4E0D-BF3B-638D0F8830CE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8351n:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7C504C3-7EEE-4A0F-8589-19C1E806E690", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8352m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1E2981E-8DCA-4DB7-8E5B-B0D94B508303", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8352m:-:*:*:*:*:*:*:*", "matchCriteriaId": "5230F6AF-88CB-4EE2-B292-8B9A7217D10F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8352s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "441CAAE3-9CC4-4C78-A4A3-CCCDDF2D9F24", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8352s:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B45C39D-03E8-46C1-88DD-94E382F4A961", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8352v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79B26858-BA9D-4DC4-B19F-A37D98E5D567", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8352v:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF2DC691-025A-441E-AAC2-C8583F54733D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8352y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2FACD9F-6BB6-4D8C-9E35-0EDCD900C20B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8352y:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FB7EE6-6808-4879-A0A3-E85FE5CB37CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8358_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8710FEA6-3A6D-4F2E-8E41-57CC96231A5C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8358:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCE086F8-5C8B-4F0C-B53A-76BD4E67B678", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8358p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6CF7B9C-80B6-4E9A-B581-A7E8D0B493FA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8358p:-:*:*:*:*:*:*:*", "matchCriteriaId": "00B21B5C-0FDE-4A8E-A9FC-5CF822A74B20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8360y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACE0C287-92FB-4BF2-B30D-0525C4266536", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8360y:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E41414A-6B0B-4511-A9A1-7FF99DD25DB6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8362_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB219989-055E-4D04-8738-7AF4E66E3A57", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8362:-:*:*:*:*:*:*:*", "matchCriteriaId": "91EB66B4-8F1B-4F35-9371-17FB761997CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8368_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A150305A-B59C-4C93-B0CB-93A6F408334F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8368:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBDFD1AF-2716-4C95-ADFF-79EFA915C286", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8368q_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A443FB47-021C-4B5F-84D2-C2612DDF5893", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8368q:-:*:*:*:*:*:*:*", "matchCriteriaId": "5390A12B-80BD-4889-BF0F-95E65D10D037", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8380_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5EAD7AA-B67C-4864-94D3-DBE56119A667", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8380:-:*:*:*:*:*:*:*", "matchCriteriaId": "33FA0279-D587-471E-8EC0-211F78DA4DFD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4309y_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EBE15F3-8B56-444A-9956-7FC9AF7D3345", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4309y:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB267830-FA6E-4C2E-8BBE-C3DA12A6A33D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4310_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "678E18FE-BA19-4C86-ADF4-B776318F5D12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4310:-:*:*:*:*:*:*:*", "matchCriteriaId": "D557D68C-8279-4BFD-9EA6-17A83754B8FF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4310t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "156C3A26-74CB-4E99-AE8A-5B49424AB857", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4310t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ECA0BC9-1CA4-4B95-B98F-9098B2550309", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4314_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A58CEC44-41C3-44FA-A512-CE0B59F4B294", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4314:-:*:*:*:*:*:*:*", "matchCriteriaId": "1298CF87-124D-450B-928D-F39CCA2BAF42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_silver_4316_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "446A632A-3B5E-490B-BF69-91190885380F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_silver_4316:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF12820F-A2BE-44BF-A85D-7F4623898DAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6330h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73DEE8C8-6216-47C1-A5E9-007842AF111D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6330h:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6C4A47D-7F66-4ACC-9C69-0A355D46CDC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8356h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3816252E-5421-442E-B8F3-C3A6B78F3B6E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8356h:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB6DEAA1-3209-4B49-B931-43E8C1C5BE14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8360h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5D03D31-328A-4AD5-88D4-037A4317F61D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8360h:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB15368B-21A1-429E-8B9C-A095C4E8BA67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8360hl_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22EB43AC-A091-4FF6-AE2D-FCCBFF49B7BD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8360hl:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA925F96-6DDD-4F71-BF13-710C8A89D860", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5318h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD8048C0-45BB-4532-BD0C-98C8723C7862", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5318h:-:*:*:*:*:*:*:*", "matchCriteriaId": "43808CCF-1EF0-41CE-983D-DD6BB775895E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_5320h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D25841AF-F1D2-4862-826F-A194B843B86E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_5320h:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BF1F73B-4736-40BC-9053-951B5BF1059E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6328h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BBC16B4-09E6-4122-9A7D-B2DD0C82C1BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6328h:-:*:*:*:*:*:*:*", "matchCriteriaId": "710DBCD5-788D-4140-AC16-EC6E126CFA66", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6328hl_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CAF6929-D8FE-4A6E-BB9F-E736680487B7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6328hl:-:*:*:*:*:*:*:*", "matchCriteriaId": "A767EC83-AAED-4FEA-A35E-A503369FE4FB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_gold_6348h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EBE74D3-855F-4726-B265-A7DF93121A94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_gold_6348h:-:*:*:*:*:*:*:*", "matchCriteriaId": "59C5122F-D822-4E71-A417-88EB51F1786B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8353h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9373835F-E7B5-442F-B11A-A46771B2D695", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8353h:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBE07EA7-4CDF-4038-A948-6AC126C7F6AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8354h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "574533C8-52E2-445A-8C57-2357892468EF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8354h:-:*:*:*:*:*:*:*", "matchCriteriaId": "06A2241C-37AE-41AE-A8D1-D9AB18CCE16D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8376h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7428FE4A-4CA2-44AA-A412-81C6CC15FA04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8376h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1D6444A-B9CF-4D70-A8A9-E6B57B6F13DE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8376hl_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3506304-A3F5-482B-BFB9-2C4E0D5D8D94", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8376hl:-:*:*:*:*:*:*:*", "matchCriteriaId": "05637A96-AF09-4FF5-A918-AB369AA2D1CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8380h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0AA8576-BB5B-4128-92B3-50F839A5305B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8380h:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1CC27DB-11D4-412A-BC69-CF32A0CABCF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:xeon_platinum_8380hl_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "896731D5-B752-49F5-BD8E-924385C0E6F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:xeon_platinum_8380hl:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FE9694-F0E7-4B45-82A1-065DA96B9794", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure via local access." } ], "id": "CVE-2023-23908", "lastModified": "2024-11-21T07:47:04.603", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 4.0, "source": "secure@intel.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-08-11T03:15:18.510", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/" }, { "source": "secure@intel.com", "url": "https://security.netapp.com/advisory/ntap-20230824-0003/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5474" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.netapp.com/advisory/ntap-20230824-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2023/dsa-5474" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "secure@intel.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
intel | microcode | * | |
debian | debian_linux | 10.0 | |
netapp | fas\/aff_bios | - | |
netapp | hci_compute_node_bios | - | |
netapp | solidfire_bios | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:microcode:*:*:*:*:*:*:*:*", "matchCriteriaId": "C76EBE1C-570F-485B-B850-9E3BB00240B2", "versionEndExcluding": "20210608", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:fas\\/aff_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "A714C8D4-9623-43C0-8AF8-8904566AD42C", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C61DF9A-ABDE-44A2-A060-B088428D5064", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3BCF7CA-6C05-4FD5-A965-0F038F63D70A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Un aislamiento inapropiado de los recursos compartidos en algunos Intel\u00ae Processors puede permitir a un usuario autenticado permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local" } ], "id": "CVE-2020-24511", "lastModified": "2024-11-21T05:14:56.703", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-09T19:15:08.897", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0005/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4934" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2021/dsa-4934" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-202011-1361
Vulnerability from variot
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel(R) There are unspecified vulnerabilities in processor products.Information may be obtained. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Moderate: microcode_ctl security, bug fix and enhancement update Advisory ID: RHSA-2020:5183-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2020:5183 Issue date: 2020-11-23 CVE Names: CVE-2020-8695 CVE-2020-8696 CVE-2020-8698 =====================================================================
- Summary:
An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.3 Advanced Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Server AUS (v. 7.3) - x86_64 Red Hat Enterprise Linux Server E4S (v. 7.3) - x86_64 Red Hat Enterprise Linux Server TUS (v. 7.3) - x86_64
- Description:
The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
-
hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695)
-
hw: Vector Register Leakage-Active (CVE-2020-8696)
-
hw: Fast forward store predictor (CVE-2020-8698)
Bug Fix(es) and Enhancement(s):
- Update Intel CPU microcode to microcode-20201112 release, addresses:
- Addition of 06-55-0b/0xbf (CPX-SP A1) microcode at revision 0x700001e;
- Addition of 06-8a-01/0x10 (LKF B2/B3) microcode at revision 0x28;
- Addition of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode at revision 0x68;
- Addition of 06-a5-02/0x20 (CML-H R1) microcode at revision 0xe0;
- Addition of 06-a5-03/0x22 (CML-S 6+2 G1) microcode at revision 0xe0;
- Addition of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode at revision 0xe0;
- Addition of 06-a6-01/0x80 (CML-U 6+2 v2 K0) microcode at revision 0xe0;
- Update of 06-4e-03/0xc0 (SKL-U/U 2+3e/Y D0/K1) microcode (in intel-06-4e-03/intel-ucode/06-4e-03) from revision 0xdc up to 0xe2;
- Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006906 up to 0x2006a08;
- Update of 06-5e-03/0x36 (SKL-H/S/Xeon E3 N0/R0/S0) microcode (in intel-06-5e-03/intel-ucode/06-5e-03) from revision 0xdc up to 0xe2;
- Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up to 0xde;
- Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up to 0xde;
- Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xd6 up to 0xe0;
- Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xd6 up to 0xde;
- Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from revision 0xd6 up to 0xde;
- Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xd6 up to 0xde;
- Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xd6 up to 0xde;
- Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xd6 up to 0xde;
- Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xd6 up to 0xde;
- Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xd6 up to 0xde;
- Update of 06-3f-02/0x6f (HSX-E/EN/EP/EP 4S C0/C1/M1/R2) microcode from revision 0x43 up to 0x44;
- Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000157 up to 0x1000159;
- Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4002f01 up to 0x4003003;
- Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision 0x5002f01 up to 0x5003003;
- Update of 06-5c-09/0x03 (APL D0) microcode from revision 0x38 up to 0x40;
- Update of 06-5c-0a/0x03 (APL B1/F1) microcode from revision 0x16 up to 0x1e;
- Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x32 up to 0x34;
- Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x16 up to 0x18;
- Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x78 up to 0xa0;
-
Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xca up to 0xe0.
-
Disable 06-8c-01 (TGL-UP3/UP4 B1) microcode update by default.
-
Add README file to the documentation directory.
-
Add publicly-sourced codenames list to supply to gen_provides.sh; update the latter to handle the somewhat different format.
-
Add SUMMARY.intel-ucode file
-
Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1828583 - CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface 1890355 - CVE-2020-8696 hw: Vector Register Leakage-Active 1890356 - CVE-2020-8698 hw: Fast forward store predictor
- Package List:
Red Hat Enterprise Linux Server AUS (v. 7.3):
Source: microcode_ctl-2.1-16.37.el7_3.src.rpm
x86_64: microcode_ctl-2.1-16.37.el7_3.x86_64.rpm microcode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm
Red Hat Enterprise Linux Server E4S (v. 7.3):
Source: microcode_ctl-2.1-16.37.el7_3.src.rpm
x86_64: microcode_ctl-2.1-16.37.el7_3.x86_64.rpm microcode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm
Red Hat Enterprise Linux Server TUS (v. 7.3):
Source: microcode_ctl-2.1-16.37.el7_3.src.rpm
x86_64: microcode_ctl-2.1-16.37.el7_3.x86_64.rpm microcode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2020-8695 https://access.redhat.com/security/cve/CVE-2020-8696 https://access.redhat.com/security/cve/CVE-2020-8698 https://access.redhat.com/security/updates/classification/#moderate
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBX7v1LtzjgjWX9erEAQhhzBAAi0jG7U8W+Dm2A/Nq40aoLyRcGknttkV1 0wwy62OR4KUnqiP0gHB8Sjh6UpAPqhLNExc2+B8RyUB23yUe8/PRB1fUqpmf5150 mzwiORZfu572ao7GLskdc4SUydVSqY9QuTK7mTm+HGmOm2XQpics51xWjyfKM/TN 5lrrd3DXxTrXwsjva2tPJcCp9A1s3XAVjK16Fu+FcKvXsgxruUy41YxJMsY8Mxfj pPRzcXdMvPQYhvyv8y1KY2Mz5WMKdpOK83X6Y9iYL6d0g2UT1d3cw8AOHc6GYNFS MhLDUASoII2A4xWkXCOyaocrg58QFctEHGfnxwTU5ZGq/vfOduUSLE881thD+tqD qgQBaz0cp0tNr+nYXvhtyX9XE4ve/lszq5BxqnNF0xi9hP8T5DwZzXnhtZ+aZML2 3WlT3tqgkDE7hZqyqSG8Vd9ZLzVkjmnw7+tqRjIGvzN9eKQxLXg/fPkKeHGh+HOz y0zCBHlZKrKtz0lQHP48W9t6l0Rkh19hW1fIA46rW4C7erDcW78nBMJ2cTAxbBk1 ITTGOIHpUgn3882xKM/yAHUMK25Xkh2va/e8UpafYEazSM4H9T15N87UyCVneKdD s2N1tYHegx85eoOlt24Bw2RBPFHhFGWOtE0McQ09kyDKFyGJXUMqzPhBUvvJz8mE G3KPuKrDU0U= =Vap7 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================== Ubuntu Security Notice USN-4628-2 November 12, 2020
intel-microcode regression
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 ESM
Summary:
USN-4628-1 introduced a regression in the Intel Microcode for some processors. Unfortunately, that update prevented certain processors in the Intel Tiger Lake family from booting successfully. This update reverts the microcode update for the Tiger Lake processor family.
Please note that the 'dis_ucode_ldr' kernel command line option can be added in the boot menu to disable microcode loading for system recovery.
We apologize for the inconvenience.
Original advisory details:
Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine Easdon, Claudio Canella, and Daniel Gruss discovered that the Intel Running Average Power Limit (RAPL) feature of some Intel processors allowed a side- channel attack based on power consumption measurements. A local attacker could possibly use this to expose sensitive information. (CVE-2020-8695)
Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that some Intel(R) Processors did not properly remove sensitive information before storage or transfer in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2020-8696)
Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that some Intel(R) Processors did not properly isolate shared resources in some situations. A local attacker could possibly use this to expose sensitive information. (CVE-2020-8698)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.10: intel-microcode 3.20201110.0ubuntu0.20.10.2
Ubuntu 20.04 LTS: intel-microcode 3.20201110.0ubuntu0.20.04.2
Ubuntu 18.04 LTS: intel-microcode 3.20201110.0ubuntu0.18.04.2
Ubuntu 16.04 LTS: intel-microcode 3.20201110.0ubuntu0.16.04.2
Ubuntu 14.04 ESM: intel-microcode 3.20201110.0ubuntu0.14.04.2
After a standard system update you need to reboot your computer to make all the necessary changes
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202011-1361", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "simatic ipc477e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.15" }, { "model": "simatic field pg m6", "scope": "eq", "trust": 1.0, "vendor": "siemens", "version": "*" }, { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "9.0" }, { "model": "hci storage node bios", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "clustered data ontap", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "simatic ipc647e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "25.02.08" }, { "model": "simatic itp1000", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "23.01.08" }, { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "31" }, { "model": "simatic field pg m5", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "22.01.08" }, { "model": "hci compute node bios", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "simatic ipc847e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "25.02.08" }, { "model": "simatic ipc477e pro", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.15" }, { "model": "simatic ipc677e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "25.02.08" }, { "model": "simatic ipc427e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "21.01.15" }, { "model": "solidfire bios", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "simatic ipc627e", "scope": "lt", "trust": 1.0, "vendor": "siemens", "version": "25.02.08" }, { "model": "microcode", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "hci compute node bios", "scope": null, "trust": 0.8, "vendor": "netapp", "version": null }, { "model": "fedora", "scope": null, "trust": 0.8, "vendor": "fedora", "version": null }, { "model": "solidfire bios", "scope": null, "trust": 0.8, "vendor": "netapp", "version": null }, { "model": "gnu/linux", "scope": null, "trust": 0.8, "vendor": "debian", "version": null }, { "model": "clustered data ontap", "scope": null, "trust": 0.8, "vendor": "netapp", "version": null }, { "model": "microcode", "scope": null, "trust": 0.8, "vendor": "\u30a4\u30f3\u30c6\u30eb", "version": null }, { "model": "hci storage node bios", "scope": null, "trust": 0.8, "vendor": "netapp", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-013420" }, { "db": "NVD", "id": "CVE-2020-8698" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:microcode:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:intel:microcode:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:netapp:solidfire:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:netapp:solidfire:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "22.01.08", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "22.01.08", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.01.15", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.01.15", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.01.15", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.01.15", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.01.15", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "21.01.15", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "25.02.08", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "25.02.08", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "25.02.08", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "25.02.08", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "25.02.08", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "25.02.08", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "25.02.08", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "25.02.08", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "23.01.08", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "23.01.08", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2020-8698" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Ubuntu", "sources": [ { "db": "PACKETSTORM", "id": "160018" }, { "db": "PACKETSTORM", "id": "160035" }, { "db": "CNNVD", "id": "CNNVD-201911-1657" } ], "trust": 0.8 }, "cve": "CVE-2020-8698", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2020-8698", "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "trust": 1.9, "userInteractionRequired": false, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-8698", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.5, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-8698", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2020-8698", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201911-1657", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2020-8698", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-8698" }, { "db": "JVNDB", "id": "JVNDB-2020-013420" }, { "db": "CNNVD", "id": "CNNVD-201911-1657" }, { "db": "NVD", "id": "CVE-2020-8698" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel(R) There are unspecified vulnerabilities in processor products.Information may be obtained. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Moderate: microcode_ctl security, bug fix and enhancement update\nAdvisory ID: RHSA-2020:5183-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2020:5183\nIssue date: 2020-11-23\nCVE Names: CVE-2020-8695 CVE-2020-8696 CVE-2020-8698 \n=====================================================================\n\n1. Summary:\n\nAn update for microcode_ctl is now available for Red Hat Enterprise Linux\n7.3 Advanced Update Support. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Server AUS (v. 7.3) - x86_64\nRed Hat Enterprise Linux Server E4S (v. 7.3) - x86_64\nRed Hat Enterprise Linux Server TUS (v. 7.3) - x86_64\n\n3. Description:\n\nThe microcode_ctl packages provide microcode updates for Intel. \n\nSecurity Fix(es):\n\n* hw: Information disclosure issue in Intel SGX via RAPL interface\n(CVE-2020-8695)\n\n* hw: Vector Register Leakage-Active (CVE-2020-8696)\n\n* hw: Fast forward store predictor (CVE-2020-8698)\n\nBug Fix(es) and Enhancement(s):\n\n* Update Intel CPU microcode to microcode-20201112 release, addresses:\n - Addition of 06-55-0b/0xbf (CPX-SP A1) microcode at revision 0x700001e;\n - Addition of 06-8a-01/0x10 (LKF B2/B3) microcode at revision 0x28;\n - Addition of 06-8c-01/0x80 (TGL-UP3/UP4 B1) microcode at revision 0x68;\n - Addition of 06-a5-02/0x20 (CML-H R1) microcode at revision 0xe0;\n - Addition of 06-a5-03/0x22 (CML-S 6+2 G1) microcode at revision 0xe0;\n - Addition of 06-a5-05/0x22 (CML-S 10+2 Q0) microcode at revision 0xe0;\n - Addition of 06-a6-01/0x80 (CML-U 6+2 v2 K0) microcode at revision\n 0xe0;\n - Update of 06-4e-03/0xc0 (SKL-U/U 2+3e/Y D0/K1) microcode (in\n intel-06-4e-03/intel-ucode/06-4e-03) from revision 0xdc up to 0xe2;\n - Update of 06-55-04/0xb7 (SKX-D/SP/W/X H0/M0/M1/U0) microcode (in\n intel-06-55-04/intel-ucode/06-55-04) from revision 0x2006906 up\n to 0x2006a08;\n - Update of 06-5e-03/0x36 (SKL-H/S/Xeon E3 N0/R0/S0) microcode (in\n intel-06-5e-03/intel-ucode/06-5e-03) from revision 0xdc up to 0xe2;\n - Update of 06-8e-09/0x10 (AML-Y 2+2 H0) microcode (in\n intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up\n to 0xde;\n - Update of 06-8e-09/0xc0 (KBL-U/U 2+3e/Y H0/J1) microcode (in\n intel-06-8e-9e-0x-dell/intel-ucode/06-8e-09) from revision 0xd6 up\n to 0xde;\n - Update of 06-8e-0a/0xc0 (CFL-U 4+3e D0, KBL-R Y0) microcode (in\n intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0a) from revision 0xd6 up\n to 0xe0;\n - Update of 06-8e-0b/0xd0 (WHL-U W0) microcode (in\n intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0b) from revision 0xd6 up\n to 0xde;\n - Update of 06-8e-0c/0x94 (AML-Y 4+2 V0, CML-U 4+2 V0, WHL-U V0)\n microcode (in intel-06-8e-9e-0x-dell/intel-ucode/06-8e-0c) from\n revision 0xd6 up to 0xde;\n - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode (in\n intel-06-8e-9e-0x-dell/intel-ucode/06-9e-09) from revision 0xd6 up\n to 0xde;\n - Update of 06-9e-0a/0x22 (CFL-H/S/Xeon E U0) microcode (in\n intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0a) from revision 0xd6 up\n to 0xde;\n - Update of 06-9e-0b/0x02 (CFL-E/H/S B0) microcode (in\n intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0b) from revision 0xd6 up\n to 0xde;\n - Update of 06-9e-0c/0x22 (CFL-H/S/Xeon E P0) microcode (in\n intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0c) from revision 0xd6 up\n to 0xde;\n - Update of 06-9e-0d/0x22 (CFL-H/S/Xeon E R0) microcode (in\n intel-06-8e-9e-0x-dell/intel-ucode/06-9e-0d) from revision 0xd6 up\n to 0xde;\n - Update of 06-3f-02/0x6f (HSX-E/EN/EP/EP 4S C0/C1/M1/R2) microcode\n from revision 0x43 up to 0x44;\n - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000157\n up to 0x1000159;\n - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x4002f01\n up to 0x4003003;\n - Update of 06-55-07/0xbf (CLX-SP/W/X B1/L1) microcode from revision\n 0x5002f01 up to 0x5003003;\n - Update of 06-5c-09/0x03 (APL D0) microcode from revision 0x38 up\n to 0x40;\n - Update of 06-5c-0a/0x03 (APL B1/F1) microcode from revision 0x16 up\n to 0x1e;\n - Update of 06-7a-01/0x01 (GLK B0) microcode from revision 0x32 up\n to 0x34;\n - Update of 06-7a-08/0x01 (GLK-R R0) microcode from revision 0x16 up\n to 0x18;\n - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x78\n up to 0xa0;\n - Update of 06-a6-00/0x80 (CML-U 6+2 A0) microcode from revision 0xca\n up to 0xe0. \n\n* Disable 06-8c-01 (TGL-UP3/UP4 B1) microcode update by default. \n\n* Add README file to the documentation directory. \n\n* Add publicly-sourced codenames list to supply to gen_provides.sh; update\n the latter to handle the somewhat different format. \n\n* Add SUMMARY.intel-ucode file\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1828583 - CVE-2020-8695 hw: Information disclosure issue in Intel SGX via RAPL interface\n1890355 - CVE-2020-8696 hw: Vector Register Leakage-Active\n1890356 - CVE-2020-8698 hw: Fast forward store predictor\n\n6. Package List:\n\nRed Hat Enterprise Linux Server AUS (v. 7.3):\n\nSource:\nmicrocode_ctl-2.1-16.37.el7_3.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-16.37.el7_3.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm\n\nRed Hat Enterprise Linux Server E4S (v. 7.3):\n\nSource:\nmicrocode_ctl-2.1-16.37.el7_3.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-16.37.el7_3.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm\n\nRed Hat Enterprise Linux Server TUS (v. 7.3):\n\nSource:\nmicrocode_ctl-2.1-16.37.el7_3.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-16.37.el7_3.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-16.37.el7_3.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-8695\nhttps://access.redhat.com/security/cve/CVE-2020-8696\nhttps://access.redhat.com/security/cve/CVE-2020-8698\nhttps://access.redhat.com/security/updates/classification/#moderate\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2020 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nG3KPuKrDU0U=\n=Vap7\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. ==========================================================================\nUbuntu Security Notice USN-4628-2\nNovember 12, 2020\n\nintel-microcode regression\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 20.10\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 ESM\n\nSummary:\n\nUSN-4628-1 introduced a regression in the Intel Microcode for some processors. Unfortunately,\nthat update prevented certain processors in the Intel Tiger Lake family\nfrom booting successfully. This update reverts the microcode update for\nthe Tiger Lake processor family. \n\nPlease note that the \u0027dis_ucode_ldr\u0027 kernel command line option can be\nadded in the boot menu to disable microcode loading for system recovery. \n\nWe apologize for the inconvenience. \n\nOriginal advisory details:\n\n Moritz Lipp, Michael Schwarz, Andreas Kogler, David Oswald, Catherine\n Easdon, Claudio Canella, and Daniel Gruss discovered that the Intel Running\n Average Power Limit (RAPL) feature of some Intel processors allowed a side-\n channel attack based on power consumption measurements. A local attacker\n could possibly use this to expose sensitive information. (CVE-2020-8695)\n \n Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that\n some Intel(R) Processors did not properly remove sensitive information\n before storage or transfer in some situations. A local attacker could\n possibly use this to expose sensitive information. (CVE-2020-8696)\n \n Ezra Caltum, Joseph Nuzman, Nir Shildan and Ofir Joseff discovered that\n some Intel(R) Processors did not properly isolate shared resources in some\n situations. A local attacker could possibly use this to expose sensitive\n information. (CVE-2020-8698)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 20.10:\n intel-microcode 3.20201110.0ubuntu0.20.10.2\n\nUbuntu 20.04 LTS:\n intel-microcode 3.20201110.0ubuntu0.20.04.2\n\nUbuntu 18.04 LTS:\n intel-microcode 3.20201110.0ubuntu0.18.04.2\n\nUbuntu 16.04 LTS:\n intel-microcode 3.20201110.0ubuntu0.16.04.2\n\nUbuntu 14.04 ESM:\n intel-microcode 3.20201110.0ubuntu0.14.04.2\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes", "sources": [ { "db": "NVD", "id": "CVE-2020-8698" }, { "db": "JVNDB", "id": "JVNDB-2020-013420" }, { "db": "VULMON", "id": "CVE-2020-8698" }, { "db": "PACKETSTORM", "id": "163924" }, { "db": "PACKETSTORM", "id": "163954" }, { "db": "PACKETSTORM", "id": "163758" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "160191" }, { "db": "PACKETSTORM", "id": "160018" }, { "db": "PACKETSTORM", "id": "160188" }, { "db": "PACKETSTORM", "id": "160035" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-8698", "trust": 3.3 }, { "db": "SIEMENS", "id": "SSA-678983", "trust": 1.7 }, { "db": "JVN", "id": "JVNVU91051134", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-013420", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-22-132-05", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "163772", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "160018", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "160035", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "163993", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "163863", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "162588", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "160187", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "163757", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "160407", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2604", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2905", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.4124", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.4327", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2797", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.0423", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2721", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.4017", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.2355", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.4200", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.1664", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2945", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.3959", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.4153", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.4033", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2672", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021083127", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021081125", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021080915", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021081834", "trust": 0.6 }, { "db": "LENOVO", "id": "LEN-49266", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201911-1657", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2020-8698", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163924", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163954", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163758", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "160191", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "160188", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-8698" }, { "db": "JVNDB", "id": "JVNDB-2020-013420" }, { "db": "PACKETSTORM", "id": "163924" }, { "db": "PACKETSTORM", "id": "163954" }, { "db": "PACKETSTORM", "id": "163758" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "160191" }, { "db": "PACKETSTORM", "id": "160018" }, { "db": "PACKETSTORM", "id": "160188" }, { "db": "PACKETSTORM", "id": "160035" }, { "db": "CNNVD", "id": "CNNVD-201911-1657" }, { "db": "NVD", "id": "CVE-2020-8698" } ] }, "id": "VAR-202011-1361", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.5185185333333333 }, "last_update_date": "2023-11-07T21:08:28.118000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "NTAP-20201113-0006 Intel Intel\u00a0Product\u00a0Security\u00a0Center", "trust": 0.8, "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html" }, { "title": "Intel Processors Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=135724" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205185 - security advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205184 - security advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205189 - security advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205181 - security advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix, and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205083 - security advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix, and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205084 - security advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix, and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205190 - security advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205182 - security advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205183 - security advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205369 - security advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205085 - security advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205188 - security advisory" }, { "title": "Red Hat: Moderate: microcode_ctl security, bug fix and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=rhsa-20205186 - security advisory" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=cve-2020-8698 log" }, { "title": "Arch Linux Advisories: [ASA-202102-34] intel-ucode: information disclosure", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=asa-202102-34" }, { "title": "Citrix Security Bulletins: Citrix Hypervisor Security Update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=citrix_security_bulletins\u0026qid=0196318f80fa91831e1ad927f423d728" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=0bfef52a44075162940391ee650c313e" }, { "title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03705 rev. 6 - BIOS November 2020 Security Updates", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=892287da75187b64a9430d6c2f52fb94" }, { "title": "HP: SUPPORT COMMUNICATION- SECURITY BULLETIN\nHPSBHF03705 rev. 6 - BIOS November 2020 Security Updates", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=f872c139829b190dd155b5676016edf1" }, { "title": "HP: HPSBHF03705 rev. 1 - BIOS November 2020 Security Updates", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=hpsbhf03705" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-8698" }, { "db": "JVNDB", "id": "JVNDB-2020-013420" }, { "db": "CNNVD", "id": "CNNVD-201911-1657" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-668", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-013420" }, { "db": "NVD", "id": "CVE-2020-8698" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8698" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20201113-0006/" }, { "trust": 1.7, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/maagik5cxkbpgy3r4ur5vo56m7mklz43/" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html" }, { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" }, { "trust": 1.2, "url": "https://access.redhat.com/security/cve/cve-2020-8698" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu91051134/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8696" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8695" }, { "trust": 0.6, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2020-8695" }, { "trust": 0.6, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.6, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2020-8696" }, { "trust": 0.6, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163863/red-hat-security-advisory-2021-3176-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.3959/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163757/red-hat-security-advisory-2021-3027-01.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021081834" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/160035/ubuntu-security-notice-usn-4628-2.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.4200/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.4153/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/160018/ubuntu-security-notice-usn-4628-1.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163772/red-hat-security-advisory-2021-3029-01.html" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-22-132-05" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.4327/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/160187/red-hat-security-advisory-2020-5184-01.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021081125" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021083127" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.2355" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163993/red-hat-security-advisory-2021-3364-01.html" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/intel-processors-information-disclosure-33881" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.4033/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2905" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.4017/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/162588/ubuntu-security-notice-usn-4628-3.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.4124/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.0423" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2721" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021080915" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2604" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2945" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/en/product_security/len-49266" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2672" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/160407/red-hat-security-advisory-2020-5369-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.1664" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2797" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-24511" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24512" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-24512" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24489" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-24489" }, { "trust": 0.4, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0549" }, { "trust": 0.4, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-0543" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-0549" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0543" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24511" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0548" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-0548" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.2, "url": "https://usn.ubuntu.com/4628-1" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/668.html" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:5185" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-05" }, { "trust": 0.1, "url": "https://support.hp.com/us-en/document/c06962236" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3255" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3323" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3028" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3029" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:5181" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.18.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.20.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.20.04.1" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2020:5183" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/4628-2" }, { "trust": 0.1, "url": "https://launchpad.net/bugs/1903883" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.18.04.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.20.04.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.16.04.2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20201110.0ubuntu0.20.10.2" } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-8698" }, { "db": "JVNDB", "id": "JVNDB-2020-013420" }, { "db": "PACKETSTORM", "id": "163924" }, { "db": "PACKETSTORM", "id": "163954" }, { "db": "PACKETSTORM", "id": "163758" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "160191" }, { "db": "PACKETSTORM", "id": "160018" }, { "db": "PACKETSTORM", "id": "160188" }, { "db": "PACKETSTORM", "id": "160035" }, { "db": "CNNVD", "id": "CNNVD-201911-1657" }, { "db": "NVD", "id": "CVE-2020-8698" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2020-8698" }, { "db": "JVNDB", "id": "JVNDB-2020-013420" }, { "db": "PACKETSTORM", "id": "163924" }, { "db": "PACKETSTORM", "id": "163954" }, { "db": "PACKETSTORM", "id": "163758" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "160191" }, { "db": "PACKETSTORM", "id": "160018" }, { "db": "PACKETSTORM", "id": "160188" }, { "db": "PACKETSTORM", "id": "160035" }, { "db": "CNNVD", "id": "CNNVD-201911-1657" }, { "db": "NVD", "id": "CVE-2020-8698" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-11-12T00:00:00", "db": "VULMON", "id": "CVE-2020-8698" }, { "date": "2021-07-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-013420" }, { "date": "2021-08-27T19:22:22", "db": "PACKETSTORM", "id": "163924" }, { "date": "2021-08-31T15:43:48", "db": "PACKETSTORM", "id": "163954" }, { "date": "2021-08-09T14:15:45", "db": "PACKETSTORM", "id": "163758" }, { "date": "2021-08-10T14:49:53", "db": "PACKETSTORM", "id": "163772" }, { "date": "2020-11-24T15:00:08", "db": "PACKETSTORM", "id": "160191" }, { "date": "2020-11-11T14:59:21", "db": "PACKETSTORM", "id": "160018" }, { "date": "2020-11-24T14:59:25", "db": "PACKETSTORM", "id": "160188" }, { "date": "2020-11-12T15:38:50", "db": "PACKETSTORM", "id": "160035" }, { "date": "2019-11-10T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-1657" }, { "date": "2020-11-12T18:15:00", "db": "NVD", "id": "CVE-2020-8698" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-04-26T00:00:00", "db": "VULMON", "id": "CVE-2020-8698" }, { "date": "2021-07-02T04:40:00", "db": "JVNDB", "id": "JVNDB-2020-013420" }, { "date": "2022-05-13T00:00:00", "db": "CNNVD", "id": "CNNVD-201911-1657" }, { "date": "2022-04-26T16:33:00", "db": "NVD", "id": "CVE-2020-8698" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "PACKETSTORM", "id": "160018" }, { "db": "CNNVD", "id": "CNNVD-201911-1657" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel(R)\u00a0 Vulnerabilities in processor products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-013420" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201911-1657" } ], "trust": 0.6 } }
var-202106-0344
Vulnerability from variot
Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
For the stable distribution (buster), these problems have been fixed in version 3.20210608.2~deb10u1.
Note that there are two reported regressions; for some CoffeeLake CPUs this update may break iwlwifi (https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/56) and some for Skylake R0/D0 CPUs on systems using a very outdated firmware/BIOS, the system may hang on boot: (https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/31)
If you are affected by those issues, you can recover by disabling microcode loading on boot (as documented in README.Debian (also available online at https://salsa.debian.org/hmh/intel-microcode/-/blob/master/debian/README.Debian))
We recommend that you upgrade your intel-microcode packages.
For the detailed security status of intel-microcode please refer to its security tracker page at: https://security-tracker.debian.org/tracker/intel-microcode
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmDXan0ACgkQEMKTtsN8 Tja9aQ//f1dHsEghQsedGnkMCIa2qLi12UFtb4yW7TYV6uwloqbYZMbymvoXYOAB haasn+yCaGUkXuAHxcGvZuN41EkRhdG4LfS5qoZxPMsw84ETjpV2Ohwhuqwf9P20 9pqV1QLjVPCMiCqvHatkzyRNPtRhIh0uCRx5HtIeOEyKTwhVnUJrrljUXCzMDviD 3As0n0yVUPDIcJdaVxp5mxyebf1NyIYMR+7wmzTBOhK6i+rEE4NkKGkcsYBIM1ch AdTQNHv78QZld6ixL8iCUe1NsSugZ2QjbVL1BLW45fJv3f0BIF5uo6LBzbiJlN/6 xWwOdFTfqW1ORyr0k6JQ+yKz3oSE+jfUStwf+zegWOjYes5gGaA/nATzzNwwFfCQ qDqMmnN26qMI3MswP50ESkNs2JTK3955cIJjnscp5DeFArDuCFKh9wcqSZ46/QCE GVRi+F/Dh3JQxv/jP8jfLhCvkBptuendGo9qK5v22QoeCRoHS16dLu7HHP34hRrw k//EgtP35pD9eTNiIsxhmx3qTPD0gbQbcMG/5NTVtpNqsffAxYtqTy8+/4lfPkNn AYtYrrG6tjEHe1gasLkjthB7c0YLzPLdNyZkNIk6XZ2YIhx18N80c7gTBERSJ1Sh 9lmsnX3+5GWM7Fx2NN2vL5xIEo0einMJCyTlNMRDLim2ix1vpZg= =RVf2 -----END PGP SIGNATURE----- . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: microcode_ctl security, bug fix and enhancement update Advisory ID: RHSA-2021:2305-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:2305 Issue date: 2021-06-08 CVE Names: CVE-2020-24489 CVE-2020-24511 CVE-2020-24512 CVE-2020-24513 ==================================================================== 1. Summary:
An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64
- Description:
The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
-
hw: vt-d related privilege escalation (CVE-2020-24489)
-
hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)
-
hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)
-
hw: information disclosure on some Intel Atom processors (CVE-2020-24513)
Bug Fix(es) and Enhancement(s):
-
Update Intel CPU microcode to microcode-20210525 release
-
Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1962650 - CVE-2020-24489 hw: vt-d related privilege escalation 1962666 - CVE-2020-24513 hw: information disclosure on some Intel Atom processors 1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors 1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: microcode_ctl-2.1-73.9.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.9.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: microcode_ctl-2.1-73.9.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.9.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: microcode_ctl-2.1-73.9.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.9.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: microcode_ctl-2.1-73.9.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.9.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2020-24489 https://access.redhat.com/security/cve/CVE-2020-24511 https://access.redhat.com/security/cve/CVE-2020-24512 https://access.redhat.com/security/cve/CVE-2020-24513 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYMAkjNzjgjWX9erEAQj9Rw//aAXwJWN2Q/e3KJ6n+bdhBXSWxMI+ro7r 86Elrmw3BY2uTNbkjEorxQfON15ZawMJn0eNprNGA4gxRJ1/OlV+bMXcXsHcxdwt 2ndTxSL9G3xd+B3j6L8N2YQAXzCSzJT2ohbFPntZeMDpd6hILbNO+XDmnPu0uEsh E1Rl1BNsQJGoJ9yrrk9hqae2erlB2nTuDwYcNN6YWANkpWxPnzrJBRt115hBL/Xm Gh9vsxTC98/V+TWn0o0gLDUr0sM21KhD2U8F3byxBQB4Kr4Y0X34U12whwHkG95b m+HKj38OHmwhm+JZV68AsVBbnaa4TM3ilccuAVujxcW10IyXZBsmBFoEnIQ5Y7mm X8Bc5goFlKet/cDqwwUDBvjFfXfC61+2N4gRnWp48b8+vojs+T6JsurrCJbRhXjL gy8adoRwG3zNj+0xh7sHjX7XkIYFwrWMxiFHUaJWMV8pfx6NvGJJTiRR6n1+nKJt scM4MX7RUnLlcmRMbN4HpU4Kg7CLqI3dgiJ1XAgIUyB4Xvsb+Ckp/M8EB9I+GLDP Z4feYJ/cplYpSCcRG0xxHsnqrDFgAI0P/KVy9GQeAaXWWVwQzP5vHr+tauLSaEae q4MCBAMQQ69TX2rSLhnwtH1fpVuBsZibIN3QAikZM///peIXrNcmR4jPBVRPU6p+ ulH8AIb5GRA=sYI9 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . ========================================================================= Ubuntu Security Notice USN-4985-1 June 09, 2021
intel-microcode vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.04
- Ubuntu 20.10
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM
Summary:
Several security issues were fixed in Intel Microcode. This may allow a local user to perform a privilege escalation attack. (CVE-2021-24489)
Joseph Nuzman discovered that some Intel processors may not properly apply EIBRS mitigations (originally developed for CVE-2017-5715) and hence may allow unauthorized memory reads via sidechannel attacks. A local attacker could use this to expose sensitive information, including kernel memory. (CVE-2020-24511)
Travis Downs discovered that some Intel processors did not properly flush cache-lines for trivial-data values. This may allow an unauthorized user to infer the presence of these trivial-data-cache-lines via timing sidechannel attacks. A local attacker could use this to expose sensitive information. (CVE-2020-24512)
It was discovered that certain Intel Atom processors could expose memory contents stored in microarchitectural buffers. A local attacker could use this to expose sensitive information. (CVE-2020-24513)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 21.04: intel-microcode 3.20210608.0ubuntu0.21.04.1
Ubuntu 20.10: intel-microcode 3.20210608.0ubuntu0.20.10.1
Ubuntu 20.04 LTS: intel-microcode 3.20210608.0ubuntu0.20.04.1
Ubuntu 18.04 LTS: intel-microcode 3.20210608.0ubuntu0.18.04.1
Ubuntu 16.04 ESM: intel-microcode 3.20210608.0ubuntu0.16.04.1+esm1
Ubuntu 14.04 ESM: intel-microcode 3.20210608.0ubuntu0.14.04.1+esm1
After a standard system update you need to reboot your computer to make all the necessary changes
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0344", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "solidfire bios", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "hci compute node bios", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "microcode", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "20210608" }, { "model": "fas\\/aff bios", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null } ], "sources": [ { "db": "NVD", "id": "CVE-2020-24512" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "163924" }, { "db": "PACKETSTORM", "id": "163956" }, { "db": "PACKETSTORM", "id": "163757" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "163040" }, { "db": "PACKETSTORM", "id": "163046" } ], "trust": 0.6 }, "cve": "CVE-2020-24512", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2020-24512", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.1, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-178398", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "id": "CVE-2020-24512", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-24512", "trust": 1.0, "value": "LOW" }, { "author": "VULHUB", "id": "VHN-178398", "trust": 0.1, "value": "LOW" }, { "author": "VULMON", "id": "CVE-2020-24512", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-178398" }, { "db": "VULMON", "id": "CVE-2020-24512" }, { "db": "NVD", "id": "CVE-2020-24512" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. \n\nFor the stable distribution (buster), these problems have been fixed in\nversion 3.20210608.2~deb10u1. \n\nNote that there are two reported regressions; for some CoffeeLake CPUs\nthis update may break iwlwifi\n(https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/56)\nand some for Skylake R0/D0 CPUs on systems using a very outdated firmware/BIOS,\nthe system may hang on boot:\n(https://github.com/intel/Intel-Linux-Processor-Microcode-Data-Files/issues/31)\n\nIf you are affected by those issues, you can recover by disabling microcode\nloading on boot (as documented in README.Debian (also available online at\nhttps://salsa.debian.org/hmh/intel-microcode/-/blob/master/debian/README.Debian))\n\nWe recommend that you upgrade your intel-microcode packages. \n\nFor the detailed security status of intel-microcode please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/intel-microcode\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n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\n9lmsnX3+5GWM7Fx2NN2vL5xIEo0einMJCyTlNMRDLim2ix1vpZg=\n=RVf2\n-----END PGP SIGNATURE-----\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: microcode_ctl security, bug fix and enhancement update\nAdvisory ID: RHSA-2021:2305-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:2305\nIssue date: 2021-06-08\nCVE Names: CVE-2020-24489 CVE-2020-24511 CVE-2020-24512\n CVE-2020-24513\n====================================================================\n1. Summary:\n\nAn update for microcode_ctl is now available for Red Hat Enterprise Linux\n7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. Description:\n\nThe microcode_ctl packages provide microcode updates for Intel. \n\nSecurity Fix(es):\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* hw: improper isolation of shared resources in some Intel Processors\n(CVE-2020-24511)\n\n* hw: observable timing discrepancy in some Intel Processors\n(CVE-2020-24512)\n\n* hw: information disclosure on some Intel Atom processors (CVE-2020-24513)\n\nBug Fix(es) and Enhancement(s):\n\n* Update Intel CPU microcode to microcode-20210525 release\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1962650 - CVE-2020-24489 hw: vt-d related privilege escalation\n1962666 - CVE-2020-24513 hw: information disclosure on some Intel Atom processors\n1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors\n1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.9.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.9.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.9.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.9.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.9.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.9.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.9.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.9.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-24489\nhttps://access.redhat.com/security/cve/CVE-2020-24511\nhttps://access.redhat.com/security/cve/CVE-2020-24512\nhttps://access.redhat.com/security/cve/CVE-2020-24513\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nulH8AIb5GRA=sYI9\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. =========================================================================\nUbuntu Security Notice USN-4985-1\nJune 09, 2021\n\nintel-microcode vulnerabilities\n=========================================================================\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 21.04\n- Ubuntu 20.10\n- Ubuntu 20.04 LTS\n- Ubuntu 18.04 LTS\n- Ubuntu 16.04 ESM\n- Ubuntu 14.04 ESM\n\nSummary:\n\nSeveral security issues were fixed in Intel Microcode. This may allow a local user to perform a privilege escalation\nattack. (CVE-2021-24489)\n\nJoseph Nuzman discovered that some Intel processors may not properly apply\nEIBRS mitigations (originally developed for CVE-2017-5715) and hence may\nallow unauthorized memory reads via sidechannel attacks. A local attacker\ncould use this to expose sensitive information, including kernel\nmemory. (CVE-2020-24511)\n\nTravis Downs discovered that some Intel processors did not properly flush\ncache-lines for trivial-data values. This may allow an unauthorized user to\ninfer the presence of these trivial-data-cache-lines via timing sidechannel\nattacks. A local attacker could use this to expose sensitive\ninformation. (CVE-2020-24512)\n\nIt was discovered that certain Intel Atom processors could expose memory\ncontents stored in microarchitectural buffers. A local attacker could use\nthis to expose sensitive information. (CVE-2020-24513)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 21.04:\n intel-microcode 3.20210608.0ubuntu0.21.04.1\n\nUbuntu 20.10:\n intel-microcode 3.20210608.0ubuntu0.20.10.1\n\nUbuntu 20.04 LTS:\n intel-microcode 3.20210608.0ubuntu0.20.04.1\n\nUbuntu 18.04 LTS:\n intel-microcode 3.20210608.0ubuntu0.18.04.1\n\nUbuntu 16.04 ESM:\n intel-microcode 3.20210608.0ubuntu0.16.04.1+esm1\n\nUbuntu 14.04 ESM:\n intel-microcode 3.20210608.0ubuntu0.14.04.1+esm1\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes", "sources": [ { "db": "NVD", "id": "CVE-2020-24512" }, { "db": "VULHUB", "id": "VHN-178398" }, { "db": "VULMON", "id": "CVE-2020-24512" }, { "db": "PACKETSTORM", "id": "169079" }, { "db": "PACKETSTORM", "id": "163924" }, { "db": "PACKETSTORM", "id": "163956" }, { "db": "PACKETSTORM", "id": "163757" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "163040" }, { "db": "PACKETSTORM", "id": "163046" }, { "db": "PACKETSTORM", "id": "163048" } ], "trust": 1.8 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-24512", "trust": 2.0 }, { "db": "SIEMENS", "id": "SSA-309571", "trust": 1.1 }, { "db": "PACKETSTORM", "id": "163040", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "163048", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "163046", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "163037", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163047", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163044", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163042", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163043", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163031", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163032", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163036", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-178398", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2020-24512", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "169079", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163924", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163956", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163757", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163772", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-178398" }, { "db": "VULMON", "id": "CVE-2020-24512" }, { "db": "PACKETSTORM", "id": "169079" }, { "db": "PACKETSTORM", "id": "163924" }, { "db": "PACKETSTORM", "id": "163956" }, { "db": "PACKETSTORM", "id": "163757" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "163040" }, { "db": "PACKETSTORM", "id": "163046" }, { "db": "PACKETSTORM", "id": "163048" }, { "db": "NVD", "id": "CVE-2020-24512" } ] }, "id": "VAR-202106-0344", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-178398" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T21:31:01.376000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Red Hat: CVE-2020-24512", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2020-24512" }, { "title": "Debian CVElist Bug Report Logs: intel-microcode: CVE-2020-24511 CVE-2020-24512 CVE-2020-24513 CVE-2021-24489 (INTEL-SA-00464, INTEL-SA-00465, INTEL-SA-00442)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=5d902b5a89823da316827bef43ff1012" }, { "title": "Debian Security Advisories: DSA-4934-1 intel-microcode -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=4ad7d48e75ab61a8e061047171de2577" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2020-24512 log" }, { "title": "Arch Linux Advisories: [ASA-202106-34] intel-ucode: multiple issues", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-202106-34" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=240e27e5c8fba28153598a375a2a4130" }, { "title": "CVE-2020-24512", "trust": 0.1, "url": "https://github.com/AlAIAL90/CVE-2020-24512 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2020-24512" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-203", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-178398" }, { "db": "NVD", "id": "CVE-2020-24512" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.2, "url": "https://security.netapp.com/advisory/ntap-20210611-0005/" }, { "trust": 1.2, "url": "https://www.debian.org/security/2021/dsa-4934" }, { "trust": 1.2, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html" }, { "trust": 1.1, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24511" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24512" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-24512" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24489" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2020-24511" }, { "trust": 0.6, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2020-24489" }, { "trust": 0.6, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.6, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.6, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.6, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.6, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24513" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8696" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-8698" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8698" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0549" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-0543" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-8695" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8695" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-0549" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0543" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-8696" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0548" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2020-0548" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-24513" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/203.html" }, { "trust": 0.1, "url": "https://github.com/alaial90/cve-2020-24512" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://salsa.debian.org/hmh/intel-microcode/-/blob/master/debian/readme.debian))" }, { "trust": 0.1, "url": "https://github.com/intel/intel-linux-processor-microcode-data-files/issues/56)" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://github.com/intel/intel-linux-processor-microcode-data-files/issues/31)" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/intel-microcode" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3255" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3322" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3027" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3029" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2307" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2305" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-24489" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20210608.0ubuntu0.20.10.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20210608.0ubuntu0.21.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20210608.0ubuntu0.20.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/intel-microcode/3.20210608.0ubuntu0.18.04.1" }, { "trust": 0.1, "url": "https://ubuntu.com/security/notices/usn-4985-1" } ], "sources": [ { "db": "VULHUB", "id": "VHN-178398" }, { "db": "VULMON", "id": "CVE-2020-24512" }, { "db": "PACKETSTORM", "id": "169079" }, { "db": "PACKETSTORM", "id": "163924" }, { "db": "PACKETSTORM", "id": "163956" }, { "db": "PACKETSTORM", "id": "163757" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "163040" }, { "db": "PACKETSTORM", "id": "163046" }, { "db": "PACKETSTORM", "id": "163048" }, { "db": "NVD", "id": "CVE-2020-24512" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-178398" }, { "db": "VULMON", "id": "CVE-2020-24512" }, { "db": "PACKETSTORM", "id": "169079" }, { "db": "PACKETSTORM", "id": "163924" }, { "db": "PACKETSTORM", "id": "163956" }, { "db": "PACKETSTORM", "id": "163757" }, { "db": "PACKETSTORM", "id": "163772" }, { "db": "PACKETSTORM", "id": "163040" }, { "db": "PACKETSTORM", "id": "163046" }, { "db": "PACKETSTORM", "id": "163048" }, { "db": "NVD", "id": "CVE-2020-24512" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-09T00:00:00", "db": "VULHUB", "id": "VHN-178398" }, { "date": "2021-06-09T00:00:00", "db": "VULMON", "id": "CVE-2020-24512" }, { "date": "2021-06-28T19:12:00", "db": "PACKETSTORM", "id": "169079" }, { "date": "2021-08-27T19:22:22", "db": "PACKETSTORM", "id": "163924" }, { "date": "2021-08-31T15:44:21", "db": "PACKETSTORM", "id": "163956" }, { "date": "2021-08-09T14:15:37", "db": "PACKETSTORM", "id": "163757" }, { "date": "2021-08-10T14:49:53", "db": "PACKETSTORM", "id": "163772" }, { "date": "2021-06-09T13:40:18", "db": "PACKETSTORM", "id": "163040" }, { "date": "2021-06-09T13:42:01", "db": "PACKETSTORM", "id": "163046" }, { "date": "2021-06-09T13:42:19", "db": "PACKETSTORM", "id": "163048" }, { "date": "2021-06-09T19:15:08.930000", "db": "NVD", "id": "CVE-2020-24512" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-09-09T00:00:00", "db": "VULHUB", "id": "VHN-178398" }, { "date": "2021-08-10T00:00:00", "db": "VULMON", "id": "CVE-2020-24512" }, { "date": "2021-09-09T12:56:22.933000", "db": "NVD", "id": "CVE-2020-24512" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "PACKETSTORM", "id": "163048" } ], "trust": 0.1 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Debian Security Advisory 4934-1", "sources": [ { "db": "PACKETSTORM", "id": "169079" } ], "trust": 0.1 } }
var-202106-0343
Vulnerability from variot
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel Processors (Intel processors) are Intel Corporation's processors that interpret computer instructions and process data in computer software. An authenticated attacker could exploit this vulnerability to obtain sensitive information. 6 ELS) - i386, x86_64
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: microcode_ctl security, bug fix and enhancement update Advisory ID: RHSA-2021:2305-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:2305 Issue date: 2021-06-08 CVE Names: CVE-2020-24489 CVE-2020-24511 CVE-2020-24512 CVE-2020-24513 ==================================================================== 1. Summary:
An update for microcode_ctl is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Client (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode (v. 7) - x86_64 Red Hat Enterprise Linux Server (v. 7) - x86_64 Red Hat Enterprise Linux Workstation (v. 7) - x86_64
- Description:
The microcode_ctl packages provide microcode updates for Intel.
Security Fix(es):
-
hw: vt-d related privilege escalation (CVE-2020-24489)
-
hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511)
-
hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512)
-
hw: information disclosure on some Intel Atom processors (CVE-2020-24513)
Bug Fix(es) and Enhancement(s):
-
Update Intel CPU microcode to microcode-20210525 release
-
Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1962650 - CVE-2020-24489 hw: vt-d related privilege escalation 1962666 - CVE-2020-24513 hw: information disclosure on some Intel Atom processors 1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors 1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors
- Package List:
Red Hat Enterprise Linux Client (v. 7):
Source: microcode_ctl-2.1-73.9.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.9.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpm
Red Hat Enterprise Linux ComputeNode (v. 7):
Source: microcode_ctl-2.1-73.9.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.9.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpm
Red Hat Enterprise Linux Server (v. 7):
Source: microcode_ctl-2.1-73.9.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.9.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 7):
Source: microcode_ctl-2.1-73.9.el7_9.src.rpm
x86_64: microcode_ctl-2.1-73.9.el7_9.x86_64.rpm microcode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2020-24489 https://access.redhat.com/security/cve/CVE-2020-24511 https://access.redhat.com/security/cve/CVE-2020-24512 https://access.redhat.com/security/cve/CVE-2020-24513 https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYMAkjNzjgjWX9erEAQj9Rw//aAXwJWN2Q/e3KJ6n+bdhBXSWxMI+ro7r 86Elrmw3BY2uTNbkjEorxQfON15ZawMJn0eNprNGA4gxRJ1/OlV+bMXcXsHcxdwt 2ndTxSL9G3xd+B3j6L8N2YQAXzCSzJT2ohbFPntZeMDpd6hILbNO+XDmnPu0uEsh E1Rl1BNsQJGoJ9yrrk9hqae2erlB2nTuDwYcNN6YWANkpWxPnzrJBRt115hBL/Xm Gh9vsxTC98/V+TWn0o0gLDUr0sM21KhD2U8F3byxBQB4Kr4Y0X34U12whwHkG95b m+HKj38OHmwhm+JZV68AsVBbnaa4TM3ilccuAVujxcW10IyXZBsmBFoEnIQ5Y7mm X8Bc5goFlKet/cDqwwUDBvjFfXfC61+2N4gRnWp48b8+vojs+T6JsurrCJbRhXjL gy8adoRwG3zNj+0xh7sHjX7XkIYFwrWMxiFHUaJWMV8pfx6NvGJJTiRR6n1+nKJt scM4MX7RUnLlcmRMbN4HpU4Kg7CLqI3dgiJ1XAgIUyB4Xvsb+Ckp/M8EB9I+GLDP Z4feYJ/cplYpSCcRG0xxHsnqrDFgAI0P/KVy9GQeAaXWWVwQzP5vHr+tauLSaEae q4MCBAMQQ69TX2rSLhnwtH1fpVuBsZibIN3QAikZM///peIXrNcmR4jPBVRPU6p+ ulH8AIb5GRA=sYI9 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202106-0343", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "linux", "scope": "eq", "trust": 1.0, "vendor": "debian", "version": "10.0" }, { "model": "solidfire bios", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "hci compute node bios", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null }, { "model": "microcode", "scope": "lt", "trust": 1.0, "vendor": "intel", "version": "20210608" }, { "model": "fas\\/aff bios", "scope": "eq", "trust": 1.0, "vendor": "netapp", "version": null } ], "sources": [ { "db": "NVD", "id": "CVE-2020-24511" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "163031" }, { "db": "PACKETSTORM", "id": "163032" }, { "db": "PACKETSTORM", "id": "163036" }, { "db": "PACKETSTORM", "id": "163037" }, { "db": "PACKETSTORM", "id": "163042" }, { "db": "PACKETSTORM", "id": "163046" }, { "db": "PACKETSTORM", "id": "163047" }, { "db": "PACKETSTORM", "id": "163993" } ], "trust": 0.8 }, "cve": "CVE-2020-24511", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2020-24511", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "VHN-178397", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "LOW", "trust": 0.1, "vectorString": "AV:L/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.0, "id": "CVE-2020-24511", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-24511", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202106-634", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-178397", "trust": 0.1, "value": "LOW" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-178397" }, { "db": "CNNVD", "id": "CNNVD-202106-634" }, { "db": "NVD", "id": "CVE-2020-24511" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. Intel Processors (Intel processors) are Intel Corporation\u0027s processors that interpret computer instructions and process data in computer software. An authenticated attacker could exploit this vulnerability to obtain sensitive information. 6 ELS) - i386, x86_64\n\n3. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Important: microcode_ctl security, bug fix and enhancement update\nAdvisory ID: RHSA-2021:2305-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:2305\nIssue date: 2021-06-08\nCVE Names: CVE-2020-24489 CVE-2020-24511 CVE-2020-24512\n CVE-2020-24513\n====================================================================\n1. Summary:\n\nAn update for microcode_ctl is now available for Red Hat Enterprise Linux\n7. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Client (v. 7) - x86_64\nRed Hat Enterprise Linux ComputeNode (v. 7) - x86_64\nRed Hat Enterprise Linux Server (v. 7) - x86_64\nRed Hat Enterprise Linux Workstation (v. 7) - x86_64\n\n3. Description:\n\nThe microcode_ctl packages provide microcode updates for Intel. \n\nSecurity Fix(es):\n\n* hw: vt-d related privilege escalation (CVE-2020-24489)\n\n* hw: improper isolation of shared resources in some Intel Processors\n(CVE-2020-24511)\n\n* hw: observable timing discrepancy in some Intel Processors\n(CVE-2020-24512)\n\n* hw: information disclosure on some Intel Atom processors (CVE-2020-24513)\n\nBug Fix(es) and Enhancement(s):\n\n* Update Intel CPU microcode to microcode-20210525 release\n\n4. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1962650 - CVE-2020-24489 hw: vt-d related privilege escalation\n1962666 - CVE-2020-24513 hw: information disclosure on some Intel Atom processors\n1962702 - CVE-2020-24511 hw: improper isolation of shared resources in some Intel Processors\n1962722 - CVE-2020-24512 hw: observable timing discrepancy in some Intel Processors\n\n6. Package List:\n\nRed Hat Enterprise Linux Client (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.9.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.9.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux ComputeNode (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.9.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.9.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.9.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.9.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 7):\n\nSource:\nmicrocode_ctl-2.1-73.9.el7_9.src.rpm\n\nx86_64:\nmicrocode_ctl-2.1-73.9.el7_9.x86_64.rpm\nmicrocode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2020-24489\nhttps://access.redhat.com/security/cve/CVE-2020-24511\nhttps://access.redhat.com/security/cve/CVE-2020-24512\nhttps://access.redhat.com/security/cve/CVE-2020-24513\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\nulH8AIb5GRA=sYI9\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n", "sources": [ { "db": "NVD", "id": "CVE-2020-24511" }, { "db": "VULHUB", "id": "VHN-178397" }, { "db": "PACKETSTORM", "id": "163031" }, { "db": "PACKETSTORM", "id": "163032" }, { "db": "PACKETSTORM", "id": "163036" }, { "db": "PACKETSTORM", "id": "163037" }, { "db": "PACKETSTORM", "id": "163042" }, { "db": "PACKETSTORM", "id": "163046" }, { "db": "PACKETSTORM", "id": "163047" }, { "db": "PACKETSTORM", "id": "163993" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-24511", "trust": 2.5 }, { "db": "SIEMENS", "id": "SSA-309571", "trust": 1.7 }, { "db": "PACKETSTORM", "id": "163031", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "163993", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2021083127", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021081125", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021080917", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021062128", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021062701", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2021081834", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "163772", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "163757", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "163863", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2537", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2905", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2258", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2243", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2088", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2945", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2721", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2010", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2672", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.4047", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.2797", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2021.3443", "trust": 0.6 }, { "db": "LENOVO", "id": "LEN-62742", "trust": 0.6 }, { "db": "ICS CERT", "id": "ICSA-21-222-05", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202106-634", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "163037", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "163047", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "163042", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "163032", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "163036", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "163046", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "163044", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163040", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163043", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "163048", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-178397", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-178397" }, { "db": "PACKETSTORM", "id": "163031" }, { "db": "PACKETSTORM", "id": "163032" }, { "db": "PACKETSTORM", "id": "163036" }, { "db": "PACKETSTORM", "id": "163037" }, { "db": "PACKETSTORM", "id": "163042" }, { "db": "PACKETSTORM", "id": "163046" }, { "db": "PACKETSTORM", "id": "163047" }, { "db": "PACKETSTORM", "id": "163993" }, { "db": "CNNVD", "id": "CNNVD-202106-634" }, { "db": "NVD", "id": "CVE-2020-24511" } ] }, "id": "VAR-202106-0343", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-178397" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T19:36:22.635000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Intel Processors Repair measures for information disclosure vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=153292" } ], "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-634" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-668", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-178397" }, { "db": "NVD", "id": "CVE-2020-24511" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" }, { "trust": 1.7, "url": "https://security.netapp.com/advisory/ntap-20210611-0005/" }, { "trust": 1.7, "url": "https://www.debian.org/security/2021/dsa-4934" }, { "trust": 1.7, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html" }, { "trust": 1.7, "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html" }, { "trust": 1.4, "url": "https://access.redhat.com/security/cve/cve-2020-24511" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24489" }, { "trust": 0.8, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24512" }, { "trust": 0.8, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24511" }, { "trust": 0.8, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.8, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.8, "url": "https://access.redhat.com/security/cve/cve-2020-24489" }, { "trust": 0.8, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.8, "url": "https://access.redhat.com/security/cve/cve-2020-24512" }, { "trust": 0.8, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.7, "url": "https://access.redhat.com/security/cve/cve-2020-24513" }, { "trust": 0.7, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-24513" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163863/red-hat-security-advisory-2021-3176-01.html" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/en/product_security/len-62742" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163757/red-hat-security-advisory-2021-3027-01.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021081834" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2537" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/6520482" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2243" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2088" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163772/red-hat-security-advisory-2021-3029-01.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021062128" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021062701" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.4047" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021081125" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021083127" }, { "trust": 0.6, "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-222-05" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163993/red-hat-security-advisory-2021-3364-01.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/163031/red-hat-security-advisory-2021-2299-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2905" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2721" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2021080917" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/intel-processor-information-disclosure-via-shared-resources-35664" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2945" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2672" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2010" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2258" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.2797" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2021.3443" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2299" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2302" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2300" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2306" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2308" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2305" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:2303" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0548" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0549" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2021:3364" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0543" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-0549" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-8698" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8695" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8696" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-8695" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-8698" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-0543" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-8696" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-0548" } ], "sources": [ { "db": "VULHUB", "id": "VHN-178397" }, { "db": "PACKETSTORM", "id": "163031" }, { "db": "PACKETSTORM", "id": "163032" }, { "db": "PACKETSTORM", "id": "163036" }, { "db": "PACKETSTORM", "id": "163037" }, { "db": "PACKETSTORM", "id": "163042" }, { "db": "PACKETSTORM", "id": "163046" }, { "db": "PACKETSTORM", "id": "163047" }, { "db": "PACKETSTORM", "id": "163993" }, { "db": "CNNVD", "id": "CNNVD-202106-634" }, { "db": "NVD", "id": "CVE-2020-24511" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-178397" }, { "db": "PACKETSTORM", "id": "163031" }, { "db": "PACKETSTORM", "id": "163032" }, { "db": "PACKETSTORM", "id": "163036" }, { "db": "PACKETSTORM", "id": "163037" }, { "db": "PACKETSTORM", "id": "163042" }, { "db": "PACKETSTORM", "id": "163046" }, { "db": "PACKETSTORM", "id": "163047" }, { "db": "PACKETSTORM", "id": "163993" }, { "db": "CNNVD", "id": "CNNVD-202106-634" }, { "db": "NVD", "id": "CVE-2020-24511" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-06-09T00:00:00", "db": "VULHUB", "id": "VHN-178397" }, { "date": "2021-06-09T13:26:32", "db": "PACKETSTORM", "id": "163031" }, { "date": "2021-06-09T13:26:50", "db": "PACKETSTORM", "id": "163032" }, { "date": "2021-06-09T13:28:02", "db": "PACKETSTORM", "id": "163036" }, { "date": "2021-06-09T13:28:17", "db": "PACKETSTORM", "id": "163037" }, { "date": "2021-06-09T13:40:32", "db": "PACKETSTORM", "id": "163042" }, { "date": "2021-06-09T13:42:01", "db": "PACKETSTORM", "id": "163046" }, { "date": "2021-06-09T13:42:12", "db": "PACKETSTORM", "id": "163047" }, { "date": "2021-08-31T16:27:14", "db": "PACKETSTORM", "id": "163993" }, { "date": "2021-06-08T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-634" }, { "date": "2021-06-09T19:15:08.897000", "db": "NVD", "id": "CVE-2020-24511" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-09-09T00:00:00", "db": "VULHUB", "id": "VHN-178397" }, { "date": "2022-02-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202106-634" }, { "date": "2021-09-09T12:55:19.680000", "db": "NVD", "id": "CVE-2020-24511" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-634" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel Processors Information disclosure vulnerability", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-634" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-202106-634" } ], "trust": 0.6 } }
var-201905-0711
Vulnerability from variot
Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf. Intel Xeon Scalable Processors and so on are products of Intel Corporation of the United States. Intel XeonScalable Processors is a scalable server central processing unit (CPU). IntelXeonProcessorE7v4Family is a XeonE7 series server central processing unit (CPU). IntelXeonProcessorE5v4Family is a XeonE5 series server central processing unit (CPU). An information disclosure vulnerability exists in several Intel products. The vulnerability stems from errors in the configuration of the network system or product during operation. An unauthorized attacker can exploit the vulnerability to obtain sensitive information about the affected component. The following products and versions are affected: Intel Xeon Scalable Processors; Xeon Processor E7 v4 Family; Xeon Processor E5 v4 Family; Xeon Processor E3 v6 Family; Xeon Processor E3 v4 Family; Xeon Processor E; Xeon E Processor; Xeon D Processor; Puma; Pentium Processor Silver Series; Pentium Processor N Series; Pentium Processor J Series; Pentium Gold Processor Series; Mobile Communications Platforms; Microcode; Core X series Processors; Celeron Processor N Series; Celeron Processor J Series; Celeron Processor G Series; Atom Processor X Series ;Atom Processor E3900 Series;Atom Processor E3800 Series;Atom Processor. The vulnerability is due to improper memory operations that could expose a side channel on the affected system. A successful exploit could be used to conduct further attacks. Proof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available. A third-party patch is also available. VDSM manages and monitors the host's storage, memory and networks as well as virtual machine creation, other host administration tasks, statistics gathering, and log collection. ========================================================================== Ubuntu Security Notice USN-3981-2 May 15, 2019
linux-hwe, linux-azure, linux-gcp, linux-oracle vulnerabilities
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 LTS
- Ubuntu 14.04 ESM
Summary:
Several security issues were fixed in the Linux kernel. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 18.04 LTS for Ubuntu 16.04 LTS and for the Linux Azure kernel for Ubuntu 14.04 LTS.
Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Giorgi Maisuradze, Dan Horea Lutas, Andrei Lutas, Volodymyr Pikhur, Stephan van Schaik, Alyssa Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Moritz Lipp, Michael Schwarz, and Daniel Gruss discovered that memory previously stored in microarchitectural fill buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. (CVE-2018-12130)
Brandon Falk, Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Stephan van Schaik, Alyssa Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida discovered that memory previously stored in microarchitectural load ports of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. (CVE-2018-12127)
Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Marina Minkin, Daniel Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel Gruss, Berk Sunar, Frank Piessens, and Yuval Yarom discovered that memory previously stored in microarchitectural store buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. (CVE-2018-12126)
Vasily Averin and Evgenii Shatokhin discovered that a use-after-free vulnerability existed in the NFS41+ subsystem when multiple network namespaces are in use. A local attacker in a container could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-16884)
Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Volodrmyr Pikhur, Moritz Lipp, Michael Schwarz, Daniel Gruss, Stephan van Schaik, Alyssa Milburn, Sebastian \xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and Cristiano Giuffrida discovered that uncacheable memory previously stored in microarchitectural buffers of an Intel CPU core may be exposed to a malicious process that is executing on the same CPU core. (CVE-2019-11091)
Matteo Croce, Natale Vinto, and Andrea Spagnolo discovered that the cgroups subsystem of the Linux kernel did not properly account for SCTP socket buffers. A local attacker could use this to cause a denial of service (system crash). (CVE-2019-3874)
Alex Williamson discovered that the vfio subsystem of the Linux kernel did not properly limit DMA mappings. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-3882)
Hugues Anguelkov discovered that the Broadcom Wifi driver in the Linux kernel contained a heap buffer overflow. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-9500)
Hugues Anguelkov discovered that the Broadcom Wifi driver in the Linux kernel did not properly prevent remote firmware events from being processed for USB Wifi devices. A physically proximate attacker could use this to send firmware events to the device. (CVE-2019-9503)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04 LTS: linux-image-4.15.0-1013-oracle 4.15.0-1013.15~16.04.1 linux-image-4.15.0-1032-gcp 4.15.0-1032.34~16.04.1 linux-image-4.15.0-1045-azure 4.15.0-1045.49 linux-image-4.15.0-50-generic 4.15.0-50.54~16.04.1 linux-image-4.15.0-50-generic-lpae 4.15.0-50.54~16.04.1 linux-image-4.15.0-50-lowlatency 4.15.0-50.54~16.04.1 linux-image-azure 4.15.0.1045.49 linux-image-gcp 4.15.0.1032.46 linux-image-generic-hwe-16.04 4.15.0.50.71 linux-image-generic-lpae-hwe-16.04 4.15.0.50.71 linux-image-gke 4.15.0.1032.46 linux-image-lowlatency-hwe-16.04 4.15.0.50.71 linux-image-oem 4.15.0.50.71 linux-image-oracle 4.15.0.1013.7 linux-image-virtual-hwe-16.04 4.15.0.50.71
Ubuntu 14.04 ESM: linux-image-4.15.0-1045-azure 4.15.0-1045.49~14.04.1 linux-image-azure 4.15.0.1045.32
After a standard system update you need to reboot your computer to make all the necessary changes.
Please note that fully mitigating the Microarchitectural Data Sampling (MDS) issues (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and CVE-2019-11091) requires corresponding processor microcode/firmware updates or, in virtual environments, hypervisor updates. Description:
KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. (CVE-2019-11091)
- Once all virtual machines have shut down, start them again for this update to take effect. Relevant releases/architectures:
RHV-M 4.2 - noarch
- It includes the configuration of the Red Hat Support plugin, copying downstream-only artifacts to the ISO domain, and links to the knowledgebase and other support material. Description:
The kernel packages contain the Linux kernel, the core of any Linux operating system. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Important: libvirt security update Advisory ID: RHSA-2019:1180-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2019:1180 Issue date: 2019-05-14 CVE Names: CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091 =====================================================================
- Summary:
An update for libvirt is now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux Desktop (v. 6) - i386, x86_64 Red Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64 Red Hat Enterprise Linux HPC Node (v. 6) - x86_64 Red Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64 Red Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64 Red Hat Enterprise Linux Server Optional (v. 6) - x86_64 Red Hat Enterprise Linux Workstation (v. 6) - i386, x86_64 Red Hat Enterprise Linux Workstation Optional (v. 6) - x86_64
- Description:
The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.
Security Fix(es):
-
A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer. (CVE-2018-12130)
-
Modern Intel microprocessors implement hardware-level micro-optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'. As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126)
-
Microprocessors use a ‘load port’ subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPU’s pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2019-11091)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing the updated packages, libvirtd will be restarted automatically.
- Bugs fixed (https://bugzilla.redhat.com/):
1646781 - CVE-2018-12126 hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) 1646784 - CVE-2018-12130 hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) 1667782 - CVE-2018-12127 hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) 1705312 - CVE-2019-11091 hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
- Package List:
Red Hat Enterprise Linux Desktop (v. 6):
Source: libvirt-0.10.2-64.el6_10.1.src.rpm
i386: libvirt-0.10.2-64.el6_10.1.i686.rpm libvirt-client-0.10.2-64.el6_10.1.i686.rpm libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm libvirt-python-0.10.2-64.el6_10.1.i686.rpm
x86_64: libvirt-0.10.2-64.el6_10.1.x86_64.rpm libvirt-client-0.10.2-64.el6_10.1.i686.rpm libvirt-client-0.10.2-64.el6_10.1.x86_64.rpm libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm libvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm libvirt-python-0.10.2-64.el6_10.1.x86_64.rpm
Red Hat Enterprise Linux Desktop Optional (v. 6):
i386: libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm libvirt-devel-0.10.2-64.el6_10.1.i686.rpm
x86_64: libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm libvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm libvirt-devel-0.10.2-64.el6_10.1.i686.rpm libvirt-devel-0.10.2-64.el6_10.1.x86_64.rpm libvirt-lock-sanlock-0.10.2-64.el6_10.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node (v. 6):
Source: libvirt-0.10.2-64.el6_10.1.src.rpm
x86_64: libvirt-0.10.2-64.el6_10.1.x86_64.rpm libvirt-client-0.10.2-64.el6_10.1.i686.rpm libvirt-client-0.10.2-64.el6_10.1.x86_64.rpm libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm libvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm libvirt-python-0.10.2-64.el6_10.1.x86_64.rpm
Red Hat Enterprise Linux HPC Node Optional (v. 6):
x86_64: libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm libvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm libvirt-devel-0.10.2-64.el6_10.1.i686.rpm libvirt-devel-0.10.2-64.el6_10.1.x86_64.rpm libvirt-lock-sanlock-0.10.2-64.el6_10.1.x86_64.rpm
Red Hat Enterprise Linux Server (v. 6):
Source: libvirt-0.10.2-64.el6_10.1.src.rpm
i386: libvirt-0.10.2-64.el6_10.1.i686.rpm libvirt-client-0.10.2-64.el6_10.1.i686.rpm libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm libvirt-devel-0.10.2-64.el6_10.1.i686.rpm libvirt-python-0.10.2-64.el6_10.1.i686.rpm
ppc64: libvirt-0.10.2-64.el6_10.1.ppc64.rpm libvirt-client-0.10.2-64.el6_10.1.ppc.rpm libvirt-client-0.10.2-64.el6_10.1.ppc64.rpm libvirt-debuginfo-0.10.2-64.el6_10.1.ppc.rpm libvirt-debuginfo-0.10.2-64.el6_10.1.ppc64.rpm libvirt-devel-0.10.2-64.el6_10.1.ppc.rpm libvirt-devel-0.10.2-64.el6_10.1.ppc64.rpm libvirt-python-0.10.2-64.el6_10.1.ppc64.rpm
s390x: libvirt-0.10.2-64.el6_10.1.s390x.rpm libvirt-client-0.10.2-64.el6_10.1.s390.rpm libvirt-client-0.10.2-64.el6_10.1.s390x.rpm libvirt-debuginfo-0.10.2-64.el6_10.1.s390.rpm libvirt-debuginfo-0.10.2-64.el6_10.1.s390x.rpm libvirt-devel-0.10.2-64.el6_10.1.s390.rpm libvirt-devel-0.10.2-64.el6_10.1.s390x.rpm libvirt-python-0.10.2-64.el6_10.1.s390x.rpm
x86_64: libvirt-0.10.2-64.el6_10.1.x86_64.rpm libvirt-client-0.10.2-64.el6_10.1.i686.rpm libvirt-client-0.10.2-64.el6_10.1.x86_64.rpm libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm libvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm libvirt-devel-0.10.2-64.el6_10.1.i686.rpm libvirt-devel-0.10.2-64.el6_10.1.x86_64.rpm libvirt-python-0.10.2-64.el6_10.1.x86_64.rpm
Red Hat Enterprise Linux Server Optional (v. 6):
x86_64: libvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm libvirt-lock-sanlock-0.10.2-64.el6_10.1.x86_64.rpm
Red Hat Enterprise Linux Workstation (v. 6):
Source: libvirt-0.10.2-64.el6_10.1.src.rpm
i386: libvirt-0.10.2-64.el6_10.1.i686.rpm libvirt-client-0.10.2-64.el6_10.1.i686.rpm libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm libvirt-devel-0.10.2-64.el6_10.1.i686.rpm libvirt-python-0.10.2-64.el6_10.1.i686.rpm
x86_64: libvirt-0.10.2-64.el6_10.1.x86_64.rpm libvirt-client-0.10.2-64.el6_10.1.i686.rpm libvirt-client-0.10.2-64.el6_10.1.x86_64.rpm libvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm libvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm libvirt-devel-0.10.2-64.el6_10.1.i686.rpm libvirt-devel-0.10.2-64.el6_10.1.x86_64.rpm libvirt-python-0.10.2-64.el6_10.1.x86_64.rpm
Red Hat Enterprise Linux Workstation Optional (v. 6):
x86_64: libvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm libvirt-lock-sanlock-0.10.2-64.el6_10.1.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2018-12126 https://access.redhat.com/security/cve/CVE-2018-12127 https://access.redhat.com/security/cve/CVE-2018-12130 https://access.redhat.com/security/cve/CVE-2019-11091 https://access.redhat.com/security/vulnerabilities/mds https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2019 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBXNsJuNzjgjWX9erEAQhuig/7B0ZCV6Np07w9O5y2hyX9OYuOPTWWOuuj aR8ndZOC8FCgp630HSEB/Hi17XzCDCYRQusAKcfnSrDIPLJNbr2I0b3RxvXNiKu/ cfksAhrA6XtdcW4LXSSRvIQGNrBSFGiv1QCYie+ER8JzRCe8+0/K0soMOubg5ZUz 78TQeK87McXoGPAqlNrDW3h1EGpq6SJDSPJg3Q598L1di4s0HUHthV9HcjXYUlqV G2xP1mkq4P6iOmUEqQ45Kq6ntPhFPjaiR/vMz9Tj6B6Kmpb9/IxVpQ84dTideOG9 ad3O1ZPGHchITcKntYZ9IePeIhYoUFeNKccJ9J0h1JvQ7utWmS9j6zBgWmOaReb0 RbhFggIlHQ9Oxxv/jcEz9eU4n+VzGF+Dzv0lhnFNfE5HTer4YFRI+Fm58SkVb1hO 3+hIj1sMrIMm86MmCfB/MnmQeSCy8WJRyjUDkbMTAqN6xOAyDfW0h4DKw0YtS6ml Weubwvnad9ltJslFUh4XCvKNJmNtC3b1YVehE9LpTRcBwpHr26OBs3iDFvHIU5jh mi971Lw8++SZzaYaBEN2+Eop2Dhk2IdMKsFk75OQLdRY94FIZ3hvteOY32tKQBn8 +Xb+dfrSuoEnzSWULGH5LUxOYKik1SnpHphaCX+SBB3aClvCVOoxig7urLIM89Sq 71dvSxshwr0= =CE4I -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce . 7.4) - ppc64, ppc64le, s390x, x86_64
- These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201905-0711", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fedora", "scope": "eq", "trust": 1.0, "vendor": "fedoraproject", "version": "29" }, { "model": "microarchitectural fill buffer data sampling", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": null }, { "model": "6th generation core processors", "scope": "eq", "trust": 0.9, "vendor": "intel", "version": "0" }, { "model": "5th generation core processors", "scope": "eq", "trust": 0.9, "vendor": "intel", "version": "0" }, { "model": "4th generation core processors", "scope": "eq", "trust": 0.9, "vendor": "intel", "version": "0" }, { "model": "celeron processor j series", "scope": "eq", "trust": 0.9, "vendor": "intel", "version": "0" }, { "model": "celeron processor n series", "scope": "eq", "trust": 0.9, "vendor": "intel", "version": "0" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.9, "vendor": "intel", "version": "v60" }, { "model": "xeon processor e5 family", "scope": "eq", "trust": 0.9, "vendor": "intel", "version": "v40" }, { "model": "xeon processor e7 family", "scope": "eq", "trust": 0.9, "vendor": "intel", "version": "v40" }, { "model": "xeon scalable processors", "scope": null, "trust": 0.6, "vendor": "intel", "version": null }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.6, "vendor": "intel", "version": "v4" }, { "model": "workstation pro", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "workstation player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "vsphere integrated containers", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "vsphere esxi", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "vsphere data protection", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "vrealize automation", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "vcloud usage meter", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "vcenter server appliance", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "identity manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "fusion pro", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "fusion player", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "0" }, { "model": "virtualization", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "openstack platform", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "9.0" }, { "model": "openstack platform", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "14.0" }, { "model": "openstack platform", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "13.0" }, { "model": "openstack platform", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "10" }, { "model": "management agent for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "70" }, { "model": "enterprise linux server tus", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7.2" }, { "model": "enterprise linux server update services for sap solutions", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux server update services for sap solutions", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux server extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.5" }, { "model": "enterprise linux server extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.4" }, { "model": "enterprise linux server extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.3" }, { "model": "enterprise linux server extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-7.2" }, { "model": "enterprise linux server extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-6.6" }, { "model": "enterprise linux server extended update support", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "-6.5" }, { "model": "enterprise linux advanced virtualization", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "80" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "8" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "7" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "wf-500", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "9.0" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "8.1" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "7.1" }, { "model": "pan-os", "scope": "eq", "trust": 0.3, "vendor": "paloaltonetworks", "version": "8.0" }, { "model": "windows server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20190" }, { "model": "windows server r2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20120" }, { "model": "windows server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20120" }, { "model": "windows server r2 for x64-based systems sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2008" }, { "model": "windows server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "19030" }, { "model": "windows server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "18030" }, { "model": "windows server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2016" }, { "model": "windows for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "8.10" }, { "model": "windows for x64-based systems sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "7" }, { "model": "windows version for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1019030" }, { "model": "windows version for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1018090" }, { "model": "windows version for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1018030" }, { "model": "windows version for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1017090" }, { "model": "windows version for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1017030" }, { "model": "windows version for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "1016070" }, { "model": "windows for x64-based systems", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "100" }, { "model": "xeon w processor", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "xeon scalable processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "xeon processor e3 family", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "v40" }, { "model": "xeon processor e", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "xeon e processor", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "xeon d processor", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "puma", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "pentium processor silver series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "pentium processor n series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "pentium processor j series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "pentium gold processor series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "mobile communications platforms", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "microcode", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "core series processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "x0" }, { "model": "celeron processor g series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "atom processor series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "x0" }, { "model": "atom processor e3900 series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "atom processor e3800 series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "atom processor c series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "atom processor a series", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "9th generation core i9 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "9th generation core i7 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "9th generation core i5 processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "8th generation core processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "7th generation core processors", "scope": "eq", "trust": 0.3, "vendor": "intel", "version": "0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364160" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.344" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.343" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "8.0.552.342" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "73.0.3683.75" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "72.0.3626.122" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "71.0.3578.94" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "70.0.3538.110" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "67.0.3396.99" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "67.0.3396.101" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "65.0.3325.167" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "64.0.3282.167" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "64.0.3282.144" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "64.0.3282.134" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "64.0.3282.119" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "63.0.3239.86" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "62.0.3202.97" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "61.0.3163.113" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "60.0.3112.114" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "59.0.3071.92" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "59.0.3071.91" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "58.0.3029.89" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "57.0.2987.137" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "54.0.2840.79" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "53.0.2785.144" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "53.0.2785.103" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "52.0.2743.85" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "48.0.2564.92" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "48.0.2564.116" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "40.0.2214.114" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "37.0.2062.119" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "35.0.1916.155" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "33.0.1750.152" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "32.0.1700.95" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.95" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "28.0.1500.71" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.9" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.8" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.7" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.6" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.57" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.56" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.55" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.54" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.52" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.51" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.50" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.5" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.49" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.48" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.47" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.46" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.45" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.44" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.43" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.42" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.41" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.40" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.4" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.39" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.38" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.37" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.36" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.35" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.34" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.33" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.32" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.31" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.30" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.3" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.29" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.28" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.27" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.26" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.25" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.24" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.23" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.22" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.21" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.20" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.19" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.18" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.17" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.16" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.15" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.14" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.12" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.11" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.10" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "26.0.1410.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.99" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.98" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.95" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.93" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.92" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.91" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.90" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.9" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.89" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.88" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.87" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.86" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.85" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.84" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.82" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.81" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.80" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.8" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.79" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.78" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.77" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.76" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.75" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.74" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.73" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.72" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.70" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.7" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.68" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.67" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.66" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.65" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.63" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.62" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.61" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.58" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.57" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.56" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.55" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.54" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.53" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.52" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.51" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.50" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.5" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.49" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.48" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.47" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.46" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.45" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.44" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.43" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.42" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.41" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.40" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.39" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.38" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.37" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.36" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.35" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.34" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.33" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.32" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.31" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.30" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.3" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.29" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.28" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.27" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.26" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.25" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.24" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.23" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.22" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.21" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.20" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.19" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.18" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.173" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.172" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.171" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.170" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.17" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.169" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.168" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.161" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.16" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.159" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.156" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.155" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.154" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.152" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.15" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.14" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.13" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.126" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.125" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.124" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.123" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.122" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.121" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.120" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.12" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.119" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.118" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.117" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.116" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.115" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.114" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.113" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.112" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.110" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.11" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.108" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.10" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "25.0.1364.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "23.0.1271.94" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1183.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.9" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.81" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.8" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.79" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.7" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.6" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.57" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.56" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.55" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.54" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.53" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.52" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.51" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.50" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.5" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.49" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.48" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.47" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.46" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.41" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.4" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.39" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.38" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.37" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.36" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.35" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.34" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.33" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.32" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.31" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.3" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.18" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.17" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.15" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.14" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.13" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.11" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.10" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "21.0.1180.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.9" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.8" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.7" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.6" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.5" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.4" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.3" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.21" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.20" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.2" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.19" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.18" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.17" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.16" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.15" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.14" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.13" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.12" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.11" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.10" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.1" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "20.0.1132.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.9.134.14" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.9.131.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.9.128.3" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.9.126.0" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.9.110.6" }, { "model": "chrome os", "scope": "eq", "trust": 0.3, "vendor": "google", "version": "0.10.140.0" }, { "model": "xenserver", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "7.6" }, { "model": "xenserver ltsr cu2", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "7.1" }, { "model": "xenserver", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "7.0" }, { "model": "hypervisor", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "8.0" }, { "model": "chrome os", "scope": "ne", "trust": 0.3, "vendor": "google", "version": "75.0.3770.102" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-22233" }, { "db": "BID", "id": "108330" }, { "db": "NVD", "id": "CVE-2018-12130" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "152916" }, { "db": "PACKETSTORM", "id": "152900" }, { "db": "PACKETSTORM", "id": "152931" }, { "db": "PACKETSTORM", "id": "152905" }, { "db": "PACKETSTORM", "id": "152893" }, { "db": "PACKETSTORM", "id": "152880" }, { "db": "PACKETSTORM", "id": "152888" }, { "db": "PACKETSTORM", "id": "152920" } ], "trust": 0.8 }, "cve": "CVE-2018-12130", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "CVE-2018-12130", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.1, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "CNVD-2019-22233", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 3.4, "id": "VHN-122059", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:L/AC:M/AU:N/C:C/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.1, "id": "CVE-2018-12130", "impactScore": 4.0, "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-12130", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2019-22233", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201905-623", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-122059", "trust": 0.1, "value": "MEDIUM" }, { "author": "VULMON", "id": "CVE-2018-12130", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-22233" }, { "db": "VULHUB", "id": "VHN-122059" }, { "db": "VULMON", "id": "CVE-2018-12130" }, { "db": "CNNVD", "id": "CNNVD-201905-623" }, { "db": "NVD", "id": "CVE-2018-12130" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf. Intel Xeon Scalable Processors and so on are products of Intel Corporation of the United States. Intel XeonScalable Processors is a scalable server central processing unit (CPU). IntelXeonProcessorE7v4Family is a XeonE7 series server central processing unit (CPU). IntelXeonProcessorE5v4Family is a XeonE5 series server central processing unit (CPU). An information disclosure vulnerability exists in several Intel products. The vulnerability stems from errors in the configuration of the network system or product during operation. An unauthorized attacker can exploit the vulnerability to obtain sensitive information about the affected component. The following products and versions are affected: Intel Xeon Scalable Processors; Xeon Processor E7 v4 Family; Xeon Processor E5 v4 Family; Xeon Processor E3 v6 Family; Xeon Processor E3 v4 Family; Xeon Processor E; Xeon E Processor; Xeon D Processor; Puma; Pentium Processor Silver Series; Pentium Processor N Series; Pentium Processor J Series; Pentium Gold Processor Series; Mobile Communications Platforms; Microcode; Core X series Processors; Celeron Processor N Series; Celeron Processor J Series; Celeron Processor G Series; Atom Processor X Series ;Atom Processor E3900 Series;Atom Processor E3800 Series;Atom Processor. \nThe vulnerability is due to improper memory operations that could expose a side channel on the affected system. A successful exploit could be used to conduct further attacks. \nProof-of-concept (PoC) code that demonstrates an exploit of this vulnerability is publicly available. A third-party patch is also available. VDSM manages and monitors the host\u0027s storage, memory and\nnetworks as well as virtual machine creation, other host administration\ntasks, statistics gathering, and log collection. ==========================================================================\nUbuntu Security Notice USN-3981-2\nMay 15, 2019\n\nlinux-hwe, linux-azure, linux-gcp, linux-oracle vulnerabilities\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 16.04 LTS\n- Ubuntu 14.04 ESM\n\nSummary:\n\nSeveral security issues were fixed in the Linux kernel. This update provides the corresponding updates for the Linux\nHardware Enablement (HWE) kernel from Ubuntu 18.04 LTS for Ubuntu\n16.04 LTS and for the Linux Azure kernel for Ubuntu 14.04 LTS. \n\nKe Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Giorgi Maisuradze, Dan\nHorea Lutas, Andrei Lutas, Volodymyr Pikhur, Stephan van Schaik, Alyssa\nMilburn, Sebastian \\xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos,\nCristiano Giuffrida, Moritz Lipp, Michael Schwarz, and Daniel Gruss\ndiscovered that memory previously stored in microarchitectural fill buffers\nof an Intel CPU core may be exposed to a malicious process that is\nexecuting on the same CPU core. (CVE-2018-12130)\n\nBrandon Falk, Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Stephan\nvan Schaik, Alyssa Milburn, Sebastian \\xd6sterlund, Pietro Frigo, Kaveh\nRazavi, Herbert Bos, and Cristiano Giuffrida discovered that memory\npreviously stored in microarchitectural load ports of an Intel CPU core may\nbe exposed to a malicious process that is executing on the same CPU core. \n(CVE-2018-12127)\n\nKe Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Marina Minkin, Daniel\nMoghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel\nGruss, Berk Sunar, Frank Piessens, and Yuval Yarom discovered that memory\npreviously stored in microarchitectural store buffers of an Intel CPU core\nmay be exposed to a malicious process that is executing on the same CPU\ncore. \n(CVE-2018-12126)\n\nVasily Averin and Evgenii Shatokhin discovered that a use-after-free\nvulnerability existed in the NFS41+ subsystem when multiple network\nnamespaces are in use. A local attacker in a container could use this to\ncause a denial of service (system crash) or possibly execute arbitrary\ncode. (CVE-2018-16884)\n\nKe Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Volodrmyr Pikhur,\nMoritz Lipp, Michael Schwarz, Daniel Gruss, Stephan van Schaik, Alyssa\nMilburn, Sebastian \\xd6sterlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and\nCristiano Giuffrida discovered that uncacheable memory previously stored in\nmicroarchitectural buffers of an Intel CPU core may be exposed to a\nmalicious process that is executing on the same CPU core. (CVE-2019-11091)\n\nMatteo Croce, Natale Vinto, and Andrea Spagnolo discovered that the cgroups\nsubsystem of the Linux kernel did not properly account for SCTP socket\nbuffers. A local attacker could use this to cause a denial of service\n(system crash). (CVE-2019-3874)\n\nAlex Williamson discovered that the vfio subsystem of the Linux kernel did\nnot properly limit DMA mappings. A local attacker could use this to cause a\ndenial of service (memory exhaustion). (CVE-2019-3882)\n\nHugues Anguelkov discovered that the Broadcom Wifi driver in the Linux\nkernel contained a heap buffer overflow. A physically proximate attacker\ncould use this to cause a denial of service (system crash) or possibly\nexecute arbitrary code. (CVE-2019-9500)\n\nHugues Anguelkov discovered that the Broadcom Wifi driver in the Linux\nkernel did not properly prevent remote firmware events from being processed\nfor USB Wifi devices. A physically proximate attacker could use this to\nsend firmware events to the device. (CVE-2019-9503)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 16.04 LTS:\n linux-image-4.15.0-1013-oracle 4.15.0-1013.15~16.04.1\n linux-image-4.15.0-1032-gcp 4.15.0-1032.34~16.04.1\n linux-image-4.15.0-1045-azure 4.15.0-1045.49\n linux-image-4.15.0-50-generic 4.15.0-50.54~16.04.1\n linux-image-4.15.0-50-generic-lpae 4.15.0-50.54~16.04.1\n linux-image-4.15.0-50-lowlatency 4.15.0-50.54~16.04.1\n linux-image-azure 4.15.0.1045.49\n linux-image-gcp 4.15.0.1032.46\n linux-image-generic-hwe-16.04 4.15.0.50.71\n linux-image-generic-lpae-hwe-16.04 4.15.0.50.71\n linux-image-gke 4.15.0.1032.46\n linux-image-lowlatency-hwe-16.04 4.15.0.50.71\n linux-image-oem 4.15.0.50.71\n linux-image-oracle 4.15.0.1013.7\n linux-image-virtual-hwe-16.04 4.15.0.50.71\n\nUbuntu 14.04 ESM:\n linux-image-4.15.0-1045-azure 4.15.0-1045.49~14.04.1\n linux-image-azure 4.15.0.1045.32\n\nAfter a standard system update you need to reboot your computer to make\nall the necessary changes. \n\nPlease note that fully mitigating the Microarchitectural Data Sampling\n(MDS) issues (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and\nCVE-2019-11091) requires corresponding processor microcode/firmware\nupdates or, in virtual environments, hypervisor updates. Description:\n\nKVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on a variety of architectures. (CVE-2019-11091)\n\n4. Once\nall virtual machines have shut down, start them again for this update to\ntake effect. Relevant releases/architectures:\n\nRHV-M 4.2 - noarch\n\n3. \nIt includes the configuration of the Red Hat Support plugin, copying\ndownstream-only artifacts to the ISO domain, and links to the knowledgebase\nand other support material. Description:\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n=====================================================================\n Red Hat Security Advisory\n\nSynopsis: Important: libvirt security update\nAdvisory ID: RHSA-2019:1180-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2019:1180\nIssue date: 2019-05-14\nCVE Names: CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 \n CVE-2019-11091 \n=====================================================================\n\n1. Summary:\n\nAn update for libvirt is now available for Red Hat Enterprise Linux 6. \n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux Desktop (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Desktop Optional (v. 6) - i386, x86_64\nRed Hat Enterprise Linux HPC Node (v. 6) - x86_64\nRed Hat Enterprise Linux HPC Node Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Server (v. 6) - i386, ppc64, s390x, x86_64\nRed Hat Enterprise Linux Server Optional (v. 6) - x86_64\nRed Hat Enterprise Linux Workstation (v. 6) - i386, x86_64\nRed Hat Enterprise Linux Workstation Optional (v. 6) - x86_64\n\n3. Description:\n\nThe libvirt library contains a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems. In\naddition, libvirt provides tools for remote management of virtualized\nsystems. \n\nSecurity Fix(es):\n\n* A flaw was found in the implementation of the \"fill buffer\", a mechanism\nused by modern CPUs when a cache-miss is made on L1 CPU cache. If an\nattacker can generate a load operation that would create a page fault, the\nexecution will continue speculatively with incorrect data from the fill\nbuffer while the data is fetched from higher level caches. This response\ntime can be measured to infer data in the fill buffer. (CVE-2018-12130)\n\n* Modern Intel microprocessors implement hardware-level micro-optimizations\nto improve the performance of writing data back to CPU caches. The write\noperation is split into STA (STore Address) and STD (STore Data)\nsub-operations. These sub-operations allow the processor to hand-off\naddress generation logic into these sub-operations for optimized writes. \nBoth of these sub-operations write to a shared distributed processor\nstructure called the \u0027processor store buffer\u0027. As a result, an unprivileged\nattacker could use this flaw to read private data resident within the CPU\u0027s\nprocessor store buffer. (CVE-2018-12126)\n\n* Microprocessors use a \u2018load port\u2019 subcomponent to perform load operations\nfrom memory or IO. During a load operation, the load port receives data\nfrom the memory or IO subsystem and then provides the data to the CPU\nregisters and operations in the CPU\u2019s pipelines. Stale load operations\nresults are stored in the \u0027load port\u0027 table until overwritten by newer\noperations. Certain load-port operations triggered by an attacker can be\nused to reveal data about previous stale requests leaking data back to the\nattacker via a timing side-channel. (CVE-2019-11091)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAfter installing the updated packages, libvirtd will be restarted\nautomatically. \n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1646781 - CVE-2018-12126 hardware: Microarchitectural Store Buffer Data Sampling (MSBDS)\n1646784 - CVE-2018-12130 hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS)\n1667782 - CVE-2018-12127 hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS)\n1705312 - CVE-2019-11091 hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)\n\n6. Package List:\n\nRed Hat Enterprise Linux Desktop (v. 6):\n\nSource:\nlibvirt-0.10.2-64.el6_10.1.src.rpm\n\ni386:\nlibvirt-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-client-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-python-0.10.2-64.el6_10.1.i686.rpm\n\nx86_64:\nlibvirt-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-client-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-client-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-python-0.10.2-64.el6_10.1.x86_64.rpm\n\nRed Hat Enterprise Linux Desktop Optional (v. 6):\n\ni386:\nlibvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-devel-0.10.2-64.el6_10.1.i686.rpm\n\nx86_64:\nlibvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-devel-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-devel-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-lock-sanlock-0.10.2-64.el6_10.1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node (v. 6):\n\nSource:\nlibvirt-0.10.2-64.el6_10.1.src.rpm\n\nx86_64:\nlibvirt-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-client-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-client-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-python-0.10.2-64.el6_10.1.x86_64.rpm\n\nRed Hat Enterprise Linux HPC Node Optional (v. 6):\n\nx86_64:\nlibvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-devel-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-devel-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-lock-sanlock-0.10.2-64.el6_10.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server (v. 6):\n\nSource:\nlibvirt-0.10.2-64.el6_10.1.src.rpm\n\ni386:\nlibvirt-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-client-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-devel-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-python-0.10.2-64.el6_10.1.i686.rpm\n\nppc64:\nlibvirt-0.10.2-64.el6_10.1.ppc64.rpm\nlibvirt-client-0.10.2-64.el6_10.1.ppc.rpm\nlibvirt-client-0.10.2-64.el6_10.1.ppc64.rpm\nlibvirt-debuginfo-0.10.2-64.el6_10.1.ppc.rpm\nlibvirt-debuginfo-0.10.2-64.el6_10.1.ppc64.rpm\nlibvirt-devel-0.10.2-64.el6_10.1.ppc.rpm\nlibvirt-devel-0.10.2-64.el6_10.1.ppc64.rpm\nlibvirt-python-0.10.2-64.el6_10.1.ppc64.rpm\n\ns390x:\nlibvirt-0.10.2-64.el6_10.1.s390x.rpm\nlibvirt-client-0.10.2-64.el6_10.1.s390.rpm\nlibvirt-client-0.10.2-64.el6_10.1.s390x.rpm\nlibvirt-debuginfo-0.10.2-64.el6_10.1.s390.rpm\nlibvirt-debuginfo-0.10.2-64.el6_10.1.s390x.rpm\nlibvirt-devel-0.10.2-64.el6_10.1.s390.rpm\nlibvirt-devel-0.10.2-64.el6_10.1.s390x.rpm\nlibvirt-python-0.10.2-64.el6_10.1.s390x.rpm\n\nx86_64:\nlibvirt-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-client-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-client-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-devel-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-devel-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-python-0.10.2-64.el6_10.1.x86_64.rpm\n\nRed Hat Enterprise Linux Server Optional (v. 6):\n\nx86_64:\nlibvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-lock-sanlock-0.10.2-64.el6_10.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation (v. 6):\n\nSource:\nlibvirt-0.10.2-64.el6_10.1.src.rpm\n\ni386:\nlibvirt-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-client-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-devel-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-python-0.10.2-64.el6_10.1.i686.rpm\n\nx86_64:\nlibvirt-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-client-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-client-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-debuginfo-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-devel-0.10.2-64.el6_10.1.i686.rpm\nlibvirt-devel-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-python-0.10.2-64.el6_10.1.x86_64.rpm\n\nRed Hat Enterprise Linux Workstation Optional (v. 6):\n\nx86_64:\nlibvirt-debuginfo-0.10.2-64.el6_10.1.x86_64.rpm\nlibvirt-lock-sanlock-0.10.2-64.el6_10.1.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2018-12126\nhttps://access.redhat.com/security/cve/CVE-2018-12127\nhttps://access.redhat.com/security/cve/CVE-2018-12130\nhttps://access.redhat.com/security/cve/CVE-2019-11091\nhttps://access.redhat.com/security/vulnerabilities/mds\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2019 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\n71dvSxshwr0=\n=CE4I\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://www.redhat.com/mailman/listinfo/rhsa-announce\n. 7.4) - ppc64, ppc64le, s390x, x86_64\n\n3. These packages include redhat-release-virtualization-host,\novirt-node, and rhev-hypervisor. RHVH features a Cockpit user\ninterface for monitoring the host\u0027s resources and performing administrative\ntasks. These\npackages include redhat-release-virtualization-host, ovirt-node, and\nrhev-hypervisor. RHVH features a Cockpit user interface for\nmonitoring the host\u0027s resources and performing administrative tasks", "sources": [ { "db": "NVD", "id": "CVE-2018-12130" }, { "db": "CNVD", "id": "CNVD-2019-22233" }, { "db": "BID", "id": "108330" }, { "db": "VULHUB", "id": "VHN-122059" }, { "db": "VULMON", "id": "CVE-2018-12130" }, { "db": "PACKETSTORM", "id": "152952" }, { "db": "PACKETSTORM", "id": "152916" }, { "db": "PACKETSTORM", "id": "152938" }, { "db": "PACKETSTORM", "id": "152900" }, { "db": "PACKETSTORM", "id": "152931" }, { "db": "PACKETSTORM", "id": "152905" }, { "db": "PACKETSTORM", "id": "152893" }, { "db": "PACKETSTORM", "id": "152880" }, { "db": "PACKETSTORM", "id": "152888" }, { "db": "PACKETSTORM", "id": "152920" } ], "trust": 2.79 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-12130", "trust": 3.7 }, { "db": "PACKETSTORM", "id": "155281", "trust": 1.8 }, { "db": "SIEMENS", "id": "SSA-616472", "trust": 1.2 }, { "db": "SIEMENS", "id": "SSA-608355", "trust": 1.2 }, { "db": "MCAFEE", "id": "SB10292", "trust": 1.2 }, { "db": "BID", "id": "108330", "trust": 0.9 }, { "db": "CNNVD", "id": "CNNVD-201905-623", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "152952", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2019-22233", "trust": 0.6 }, { "db": "LENOVO", "id": "LEN-26696", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.1754", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0153", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.1705", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.1737.2", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.0127", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.1812", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4358", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2020.4255", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2019.4321", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "155956", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "156920", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "152942", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-122059", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2018-12130", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "152916", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "152938", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "152900", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "152931", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "152905", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "152893", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "152880", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "152888", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "152920", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-22233" }, { "db": "VULHUB", "id": "VHN-122059" }, { "db": "VULMON", "id": "CVE-2018-12130" }, { "db": "BID", "id": "108330" }, { "db": "PACKETSTORM", "id": "152952" }, { "db": "PACKETSTORM", "id": "152916" }, { "db": "PACKETSTORM", "id": "152938" }, { "db": "PACKETSTORM", "id": "152900" }, { "db": "PACKETSTORM", "id": "152931" }, { "db": "PACKETSTORM", "id": "152905" }, { "db": "PACKETSTORM", "id": "152893" }, { "db": "PACKETSTORM", "id": "152880" }, { "db": "PACKETSTORM", "id": "152888" }, { "db": "PACKETSTORM", "id": "152920" }, { "db": "CNNVD", "id": "CNNVD-201905-623" }, { "db": "NVD", "id": "CVE-2018-12130" } ] }, "id": "VAR-201905-0711", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2019-22233" }, { "db": "VULHUB", "id": "VHN-122059" } ], "trust": 1.4208844358333332 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-22233" } ] }, "last_update_date": "2024-11-29T20:38:03.182000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patches for multiple Intel Product Information Disclosure Vulnerabilities (CNVD-2019-22233)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/168519" }, { "title": "Linux Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92583" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2019/05/14/intel_hyper_threading_mitigations/" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191167 - Security Advisory" }, { "title": "Red Hat: Important: qemu-kvm-rhev security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191179 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191168 - Security Advisory" }, { "title": "Red Hat: Important: qemu-kvm-rhev security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191202 - Security Advisory" }, { "title": "Red Hat: Important: qemu-kvm-rhev security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191200 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191171 - Security Advisory" }, { "title": "Red Hat: Important: kernel-rt security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191176 - Security Advisory" }, { "title": "Red Hat: Important: libvirt security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191186 - Security Advisory" }, { "title": "Red Hat: Important: libvirt security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191197 - Security Advisory" }, { "title": "Red Hat: Important: qemu-kvm security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191195 - Security Advisory" }, { "title": "Red Hat: Important: redhat-virtualization-host security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191207 - Security Advisory" }, { "title": "Red Hat: Important: qemu-kvm security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191185 - Security Advisory" }, { "title": "Red Hat: Important: qemu-kvm-rhev security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191199 - Security Advisory" }, { "title": "Red Hat: Important: qemu-kvm-rhev security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191201 - Security Advisory" }, { "title": "Red Hat: Important: rhvm-setup-plugins security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191206 - Security Advisory" }, { "title": "Red Hat: Important: qemu-kvm security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191183 - Security Advisory" }, { "title": "Red Hat: Important: qemu-kvm security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191178 - Security Advisory" }, { "title": "Red Hat: Important: libvirt security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191177 - Security Advisory" }, { "title": "Red Hat: Important: qemu-kvm security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191198 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191193 - Security Advisory" }, { "title": "Red Hat: Important: libvirt security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191180 - Security Advisory" }, { "title": "Red Hat: Important: rhvm-appliance security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191208 - Security Advisory" }, { "title": "Red Hat: Important: qemu-kvm security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191189 - Security Advisory" }, { "title": "Red Hat: Important: libvirt security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191182 - Security Advisory" }, { "title": "Red Hat: Important: libvirt security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191184 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191172 - Security Advisory" }, { "title": "Red Hat: Important: redhat-virtualization-host security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191209 - Security Advisory" }, { "title": "Red Hat: Important: qemu-kvm security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191181 - Security Advisory" }, { "title": "Red Hat: Important: kernel-rt security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191174 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191155 - Security Advisory" }, { "title": "Red Hat: Important: vdsm security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191203 - Security Advisory" }, { "title": "Red Hat: Important: libvirt security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191187 - Security Advisory" }, { "title": "Red Hat: Important: rhvm-setup-plugins security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191205 - Security Advisory" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191169 - Security Advisory" }, { "title": "Red Hat: Important: vdsm security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191204 - Security Advisory" }, { "title": "Red Hat: Important: qemu-kvm security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191188 - Security Advisory" }, { "title": "Red Hat: Important: kernel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191196 - Security Advisory" }, { "title": "Red Hat: Important: libvirt security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191194 - Security Advisory" }, { "title": "Red Hat: Important: Advanced Virtualization security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191455 - Security Advisory" }, { "title": "Red Hat: CVE-2018-12130", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2018-12130" }, { "title": "Ubuntu Security Notice: linux vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3983-1" }, { "title": "Debian Security Advisories: DSA-4444-1 linux -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=c960cd2c4c663bee4208c29f78956570" }, { "title": "Debian CVElist Bug Report Logs: xen: XSA-288: x86: Inconsistent PV IOMMU discipline", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=5e6e0619bc9879769e2dc27651292ba1" }, { "title": "Ubuntu Security Notice: intel-microcode update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3977-3" }, { "title": "Ubuntu Security Notice: linux-lts-trusty vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3983-2" }, { "title": "Red Hat: Important: qemu-kvm-rhev security, bug fix, and enhancement update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20192553 - Security Advisory" }, { "title": "Red Hat: Important: virt:rhel security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191175 - Security Advisory" }, { "title": "Debian Security Advisories: DSA-4447-1 intel-microcode -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=783d5f8f3ad6bd4b472bac87f78daf39" }, { "title": "Debian CVElist Bug Report Logs: xen: XSA-292: x86: insufficient TLB flushing when using PCID", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=6f420d7ce4edc488c67e4f105805e662" }, { "title": "Debian CVElist Bug Report Logs: xen: XSA-293: x86: PV kernel context switch corruption", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=6489072c7d814c3eeb410e3c3014742f" }, { "title": "Debian CVElist Bug Report Logs: xen: XSA-287: x86: steal_page violates page_struct access discipline", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=2265e0ec672f9854d200348511f0f8de" }, { "title": "Debian CVElist Bug Report Logs: xen: XSA-294: x86 shadow: Insufficient TLB flushing when using PCID", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=a3e8998cea5d5825f10ea1c09276196e" }, { "title": "Debian CVElist Bug Report Logs: Xen Hypervisor security update for Intel MDS - XSA 297", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=3c5d2f154807c8ff4e324ef14ef12771" }, { "title": "Debian CVElist Bug Report Logs: xen: XSA-285: race with pass-through device hotplug", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=58ea80c1aac43705a15b8df06106fc72" }, { "title": "Debian CVElist Bug Report Logs: xen: XSA-284: grant table transfer issues on large hosts", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=3fb9629013e9105b3361893f58ff13e2" }, { "title": "Debian CVElist Bug Report Logs: xen: XSA-291: x86/PV: page type reference counting issue with failed IOMMU update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=24d344e2b0de0f8050341e180d5e3ad6" }, { "title": "Debian CVElist Bug Report Logs: xen: XSA-290: missing preemption in x86 PV page table unvalidation", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=eefa90208138c527071b467dedc4d2d8" }, { "title": "HP: HPSBHF03618 rev. 1 - Intel Microarchitectural Data Sampling Security Updates", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=hp_bulletin\u0026qid=HPSBHF03618" }, { "title": "Ubuntu Security Notice: libvirt update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3985-2" }, { "title": "Ubuntu Security Notice: libvirt update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3985-1" }, { "title": "Ubuntu Security Notice: intel-microcode update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3977-2" }, { "title": "Amazon Linux AMI: ALAS-2019-1260", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2019-1260" }, { "title": "Ubuntu Security Notice: linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3982-1" }, { "title": "Ubuntu Security Notice: intel-microcode update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3977-1" }, { "title": "Ubuntu Security Notice: linux vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3984-1" }, { "title": "Siemens Security Advisories: Siemens Security Advisory", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=30d0a4e627570cd4d5945ca971daba72" }, { "title": "Amazon Linux AMI: ALAS-2019-1205", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2019-1205" }, { "title": "Amazon Linux 2: ALAS2-2019-1205", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2019-1205" }, { "title": "Red Hat: Important: kernel security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191170 - Security Advisory" }, { "title": "Ubuntu Security Notice: linux-hwe, linux-azure vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3980-2" }, { "title": "Red Hat: Important: kernel-rt security and bug fix update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20191190 - Security Advisory" }, { "title": "Debian CVElist Bug Report Logs: qemu: CVE-2019-5008", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=3a83f6ae99e6b2e0c974ac32c9ef74a2" }, { "title": "Ubuntu Security Notice: linux-lts-xenial vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3982-2" }, { "title": "IBM: IBM Security Bulletin: Vulnerabilities in Intel CPUs affect IBM Integrated Analytics System", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=c47b16f3ebd0fdbec9f73e7f3324fed3" }, { "title": "IBM: IBM Security Bulletin: IBM has released Unified Extensible Firmware Interface (UEFI) fixes in response to Intel Microarchitectural Data Sampling (MDS) Side Channel vulnerabilities.", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=bc9f36e4b0d29a9ca06baf362fd957d0" }, { "title": "Debian Security Advisories: DSA-4564-1 linux -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=6a2efed9e3fbb73861bbf72b19140077" }, { "title": "IBM: IBM Addresses Reported Intel Security Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=ab73c937cee32c79f9fc9bc6ef3cc36d" }, { "title": "Debian Security Advisories: DSA-4469-1 libvirt -- security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=4e2fe5b482468cc28e671437a04edddc" }, { "title": "Ubuntu Security Notice: qemu update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3978-1" }, { "title": "Ubuntu Security Notice: linux-hwe, linux-azure, linux-gcp, linux-oracle vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3981-2" }, { "title": "Ubuntu Security Notice: linux, linux-aws, linux-gcp, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3981-1" }, { "title": "Presentations", "trust": 0.1, "url": "https://github.com/hwroot/Presentations " }, { "title": "", "trust": 0.1, "url": "https://github.com/j1nh0/pdf " }, { "title": "", "trust": 0.1, "url": "https://github.com/j1nh0/nisol " }, { "title": "Windows-Specture-Meltdown-Mitigation-Script", "trust": 0.1, "url": "https://github.com/simeononsecurity/Windows-Specture-Meltdown-Mitigation-Script " }, { "title": "Windows-Spectre-Meltdown-Mitigation-Script", "trust": 0.1, "url": "https://github.com/simeononsecurity/Windows-Spectre-Meltdown-Mitigation-Script " }, { "title": "", "trust": 0.1, "url": "https://github.com/kali973/spectre-meltdown-checker " }, { "title": "", "trust": 0.1, "url": "https://github.com/es0j/hyperbleed " }, { "title": "puppet-meltdown", "trust": 0.1, "url": "https://github.com/timidri/puppet-meltdown " }, { "title": "cSpeculationControlFixes", "trust": 0.1, "url": "https://github.com/poshsecurity/cSpeculationControlFixes " }, { "title": "Linux-Tools", "trust": 0.1, "url": "https://github.com/minutesinch/Linux-Tools " }, { "title": "", "trust": 0.1, "url": "https://github.com/merlinepedra25/spectre-meltdown-checker " }, { "title": "spectre-meltdown", "trust": 0.1, "url": "https://github.com/edsonjt81/spectre-meltdown " }, { "title": "spectre-meltdown-checker", "trust": 0.1, "url": "https://github.com/speed47/spectre-meltdown-checker " }, { "title": "ansible-everyday", "trust": 0.1, "url": "https://github.com/kaosagnt/ansible-everyday " }, { "title": "", "trust": 0.1, "url": "https://github.com/merlinepedra/spectre-meltdown-checker " }, { "title": "", "trust": 0.1, "url": "https://github.com/kin-cho/my-spectre-meltdown-checker " }, { "title": "Firmware-Security", "trust": 0.1, "url": "https://github.com/virusbeeE/Firmware-Security " }, { "title": "Hardware-and-Firmware-Security-Guidance", "trust": 0.1, "url": "https://github.com/nsacyber/Hardware-and-Firmware-Security-Guidance " }, { "title": "hardware-attacks-state-of-the-art", "trust": 0.1, "url": "https://github.com/codexlynx/hardware-attacks-state-of-the-art " }, { "title": "", "trust": 0.1, "url": "https://github.com/vincent-deng/veracode-container-security-finding-parser " }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/intel-zombieload-side-channel-attack-10-takeaways/144771/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/apple-patches-intel-side-channel-ios-macos/144743/" }, { "title": "Threatpost", "trust": 0.1, "url": "https://threatpost.com/intel-cpus-impacted-by-new-class-of-spectre-like-attacks/144728/" }, { "title": "BleepingComputer", "trust": 0.1, "url": "https://www.bleepingcomputer.com/news/security/new-ridl-and-fallout-attacks-impact-all-modern-intel-cpus/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-22233" }, { "db": "VULMON", "id": "CVE-2018-12130" }, { "db": "CNNVD", "id": "CNNVD-201905-623" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-122059" }, { "db": "NVD", "id": "CVE-2018-12130" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html" }, { "trust": 1.8, "url": "https://www.debian.org/security/2020/dsa-4602" }, { "trust": 1.8, "url": "https://security.freebsd.org/advisories/freebsd-sa-19:26.mcu.asc" }, { "trust": 1.8, "url": "http://packetstormsecurity.com/files/155281/freebsd-security-advisory-freebsd-sa-19-26.mcu.html" }, { "trust": 1.7, "url": "https://access.redhat.com/security/cve/cve-2018-12126" }, { "trust": 1.7, "url": "https://access.redhat.com/security/cve/cve-2018-12127" }, { "trust": 1.7, "url": "https://access.redhat.com/security/cve/cve-2018-12130" }, { "trust": 1.7, "url": "https://access.redhat.com/security/cve/cve-2019-11091" }, { "trust": 1.2, "url": "https://seclists.org/bugtraq/2019/jun/28" }, { "trust": 1.2, "url": "https://seclists.org/bugtraq/2019/jun/36" }, { "trust": 1.2, "url": "https://seclists.org/bugtraq/2019/nov/16" }, { "trust": 1.2, "url": "https://seclists.org/bugtraq/2019/nov/15" }, { "trust": 1.2, "url": "https://seclists.org/bugtraq/2020/jan/21" }, { "trust": 1.2, "url": "http://www.arubanetworks.com/assets/alert/aruba-psa-2019-003.txt" }, { "trust": 1.2, "url": "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en" }, { "trust": 1.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "trust": 1.2, "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf" }, { "trust": 1.2, "url": "https://www.synology.com/security/advisory/synology_sa_19_24" }, { "trust": 1.2, "url": "https://www.freebsd.org/security/advisories/freebsd-sa-19:07.mds.asc" }, { "trust": 1.2, "url": "https://security.gentoo.org/glsa/202003-56" }, { "trust": 1.2, "url": "https://lists.debian.org/debian-lts-announce/2019/06/msg00018.html" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2019:1455" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2019:2553" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00014.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00053.html" }, { "trust": 1.2, "url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00052.html" }, { "trust": 1.2, "url": "https://usn.ubuntu.com/3977-3/" }, { "trust": 1.2, "url": "http://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20190712-01-mds-cn" }, { "trust": 1.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10292" }, { "trust": 1.1, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/oh73sgtj575obcpsjfx6lx7kp2kzien4/" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12126" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-11091" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12130" }, { "trust": 1.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-12127" }, { "trust": 0.9, "url": "http://www.intel.com/content/www/us/en/homepage.html" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646781" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1646784" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1667782" }, { "trust": 0.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1705312" }, { "trust": 0.9, "url": "https://aws.amazon.com/security/security-bulletins/aws-2019-004/" }, { "trust": 0.9, "url": "https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-chrome-os-m75.html" }, { "trust": 0.9, "url": "https://www.vmware.com/security/advisories/vmsa-2019-0008.html" }, { "trust": 0.9, "url": "https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/adv190013" }, { "trust": 0.9, "url": "https://support.citrix.com/article/ctx251995" }, { "trust": 0.9, "url": "http://xenbits.xen.org/xsa/advisory-297.html" }, { "trust": 0.9, "url": "https://securityadvisories.paloaltonetworks.com/home/detail/150" }, { "trust": 0.9, "url": "https://www.chromium.org/chromium-os/mds-on-chromeos" }, { "trust": 0.8, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.8, "url": "https://access.redhat.com/security/vulnerabilities/mds" }, { "trust": 0.8, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.8, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.8, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.8, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.6, "url": "https://usn.ubuntu.com/3977-1/" }, { "trust": 0.6, "url": "https://usn.ubuntu.com/3985-1/" }, { "trust": 0.6, "url": "http://www.debian.org/security/2019/dsa-4444" }, { "trust": 0.6, "url": "https://lists.debian.org/debian-lts-announce/2019/05/msg00018.html" }, { "trust": 0.6, "url": "https://support.apple.com/en-us/ht210119" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/156920/gentoo-linux-security-advisory-202003-56.html" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/intel-amd-processors-information-disclosure-via-performance-measurement-29300" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/80874" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4358/" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1118439" }, { "trust": 0.6, "url": "https://www.securityfocus.com/bid/108330" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0127/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.4255/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2019.4321/" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/81098" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/81030" }, { "trust": 0.6, "url": "https://support.lenovo.com/us/en/product_security/len-26696" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.0153/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/152952/ubuntu-security-notice-usn-3985-1.html" }, { "trust": 0.6, "url": "https://www.ibm.com/support/pages/node/1107009" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/155956/debian-security-advisory-4602-1.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2020.1812/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/152942/debian-security-advisory-4447-1.html" }, { "trust": 0.5, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.3, "url": "https://access.redhat.com/articles/2974891" }, { "trust": 0.1, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026amp;id=sb10292" }, { "trust": 0.1, "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/oh73sgtj575obcpsjfx6lx7kp2kzien4/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/200.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://github.com/hwroot/presentations" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/3983-1/" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=60202" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/libvirt/1.3.1-1ubuntu10.26" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/libvirt/4.6.0-2ubuntu3.5" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/libvirt/4.0.0-1ubuntu8.10" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/usn/usn-3985-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/libvirt/5.0.0-1ubuntu2.1" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2019:1203" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9503" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/usn/usn-3981-1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-50.54~16.04.1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3882" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-9500" }, { "trust": 0.1, "url": "https://wiki.ubuntu.com/securityteam/knowledgebase/mds" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-16884" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1013.15~16.04.1" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2019-3874" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/usn/usn-3981-2" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1032.34~16.04.1" }, { "trust": 0.1, "url": "https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1045.49" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2019:1199" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2019:1206" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2019:1201" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2019:1193" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2019:1180" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2019:1184" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2019:1209" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2019-22233" }, { "db": "VULHUB", "id": "VHN-122059" }, { "db": "VULMON", "id": "CVE-2018-12130" }, { "db": "BID", "id": "108330" }, { "db": "PACKETSTORM", "id": "152952" }, { "db": "PACKETSTORM", "id": "152916" }, { "db": "PACKETSTORM", "id": "152938" }, { "db": "PACKETSTORM", "id": "152900" }, { "db": "PACKETSTORM", "id": "152931" }, { "db": "PACKETSTORM", "id": "152905" }, { "db": "PACKETSTORM", "id": "152893" }, { "db": "PACKETSTORM", "id": "152880" }, { "db": "PACKETSTORM", "id": "152888" }, { "db": "PACKETSTORM", "id": "152920" }, { "db": "CNNVD", "id": "CNNVD-201905-623" }, { "db": "NVD", "id": "CVE-2018-12130" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2019-22233" }, { "db": "VULHUB", "id": "VHN-122059" }, { "db": "VULMON", "id": "CVE-2018-12130" }, { "db": "BID", "id": "108330" }, { "db": "PACKETSTORM", "id": "152952" }, { "db": "PACKETSTORM", "id": "152916" }, { "db": "PACKETSTORM", "id": "152938" }, { "db": "PACKETSTORM", "id": "152900" }, { "db": "PACKETSTORM", "id": "152931" }, { "db": "PACKETSTORM", "id": "152905" }, { "db": "PACKETSTORM", "id": "152893" }, { "db": "PACKETSTORM", "id": "152880" }, { "db": "PACKETSTORM", "id": "152888" }, { "db": "PACKETSTORM", "id": "152920" }, { "db": "CNNVD", "id": "CNNVD-201905-623" }, { "db": "NVD", "id": "CVE-2018-12130" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-07-12T00:00:00", "db": "CNVD", "id": "CNVD-2019-22233" }, { "date": "2019-05-30T00:00:00", "db": "VULHUB", "id": "VHN-122059" }, { "date": "2019-05-30T00:00:00", "db": "VULMON", "id": "CVE-2018-12130" }, { "date": "2019-05-14T00:00:00", "db": "BID", "id": "108330" }, { "date": "2019-05-16T23:04:15", "db": "PACKETSTORM", "id": "152952" }, { "date": "2019-05-15T15:32:09", "db": "PACKETSTORM", "id": "152916" }, { "date": "2019-05-15T15:49:05", "db": "PACKETSTORM", "id": "152938" }, { "date": "2019-05-15T15:22:35", "db": "PACKETSTORM", "id": "152900" }, { "date": "2019-05-15T15:45:32", "db": "PACKETSTORM", "id": "152931" }, { "date": "2019-05-15T15:23:57", "db": "PACKETSTORM", "id": "152905" }, { "date": "2019-05-15T15:20:42", "db": "PACKETSTORM", "id": "152893" }, { "date": "2019-05-15T15:05:39", "db": "PACKETSTORM", "id": "152880" }, { "date": "2019-05-15T15:19:12", "db": "PACKETSTORM", "id": "152888" }, { "date": "2019-05-15T15:37:47", "db": "PACKETSTORM", "id": "152920" }, { "date": "2019-05-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201905-623" }, { "date": "2019-05-30T16:29:00.950000", "db": "NVD", "id": "CVE-2018-12130" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2019-07-12T00:00:00", "db": "CNVD", "id": "CNVD-2019-22233" }, { "date": "2019-06-11T00:00:00", "db": "VULHUB", "id": "VHN-122059" }, { "date": "2023-11-07T00:00:00", "db": "VULMON", "id": "CVE-2018-12130" }, { "date": "2019-06-28T08:00:00", "db": "BID", "id": "108330" }, { "date": "2021-10-29T00:00:00", "db": "CNNVD", "id": "CNNVD-201905-623" }, { "date": "2024-11-21T03:44:38.930000", "db": "NVD", "id": "CVE-2018-12130" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "BID", "id": "108330" }, { "db": "PACKETSTORM", "id": "152952" }, { "db": "PACKETSTORM", "id": "152938" }, { "db": "CNNVD", "id": "CNNVD-201905-623" } ], "trust": 1.1 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple Intel Product Information Disclosure Vulnerabilities (CNVD-2019-22233)", "sources": [ { "db": "CNVD", "id": "CNVD-2019-22233" } ], "trust": 0.6 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201905-623" } ], "trust": 0.6 } }
cve-2023-23908
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | 3rd Generation Intel(R) Xeon(R) Scalable processors |
Version: See references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:42:27.153Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html", "tags": [ "x_transferred" ], "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5474" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230824-0003/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-23908", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T13:35:03.846038Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-02T13:40:45.687Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "3rd Generation Intel(R) Xeon(R) Scalable processors", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure via local access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "information disclosure", "lang": "en" }, { "cweId": "CWE-284", "description": "Improper access control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-24T18:06:38.728Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html", "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00836.html" }, { "url": "https://www.debian.org/security/2023/dsa-5474" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html" }, { "url": "https://security.netapp.com/advisory/ntap-20230824-0003/" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2023-23908", "datePublished": "2023-08-11T02:37:07.578Z", "dateReserved": "2023-01-27T04:00:04.231Z", "dateUpdated": "2025-02-13T16:44:11.220Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-40982
Vulnerability from cvelistv5
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) Processors |
Version: See references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:28:42.939Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://xenbits.xen.org/xsa/advisory-435.html" }, { "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html", "tags": [ "x_transferred" ], "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html" }, { "tags": [ "x_transferred" ], "url": "https://downfall.page" }, { "tags": [ "x_transferred" ], "url": "https://aws.amazon.com/security/security-bulletins/AWS-2023-007/" }, { "tags": [ "x_transferred" ], "url": "https://access.redhat.com/solutions/7027704" }, { "tags": [ "x_transferred" ], "url": "https://xenbits.xen.org/xsa/advisory-435.html" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20230811-0001/" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5474" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5475" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2022-40982", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-31T20:33:43.011314Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-31T20:43:52.375Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Intel(R) Processors", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "information disclosure", "lang": "en" }, { "cweId": "CWE-1342", "description": "Information exposure through microarchitectural state after transient execution", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-27T02:06:52.425Z", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html", "url": "http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html" }, { "url": "https://downfall.page" }, { "url": "https://aws.amazon.com/security/security-bulletins/AWS-2023-007/" }, { "url": "https://access.redhat.com/solutions/7027704" }, { "url": "https://xenbits.xen.org/xsa/advisory-435.html" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html" }, { "url": "https://security.netapp.com/advisory/ntap-20230811-0001/" }, { "url": "https://www.debian.org/security/2023/dsa-5474" }, { "url": "https://www.debian.org/security/2023/dsa-5475" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/" } ] } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2022-40982", "datePublished": "2023-08-11T02:37:05.423Z", "dateReserved": "2022-09-27T00:28:29.203Z", "dateUpdated": "2025-02-13T16:33:03.126Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-24512
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20210611-0005/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2021/dsa-4934 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html | mailing-list, x_refsource_MLIST | |
https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) Processors |
Version: See references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:12:09.097Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0005/" }, { "name": "DSA-4934", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4934" }, { "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Processors", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "information disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-10T11:06:20", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0005/" }, { "name": "DSA-4934", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4934" }, { "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-24512", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Processors", "version": { "version_data": [ { "version_value": "See references" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "information disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210611-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210611-0005/" }, { "name": "DSA-4934", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4934" }, { "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-24512", "datePublished": "2021-06-09T18:53:59", "dateReserved": "2020-08-19T00:00:00", "dateUpdated": "2024-08-04T15:12:09.097Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8698
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0006/ | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html | mailing-list, x_refsource_MLIST | |
https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) Processors |
Version: See references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:46.326Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0006/" }, { "name": "FEDORA-2020-14fda1bf85", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/" }, { "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Processors", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "information disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-11T12:06:29", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0006/" }, { "name": "FEDORA-2020-14fda1bf85", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/" }, { "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-8698", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Processors", "version": { "version_data": [ { "version_value": "See references" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "information disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381" }, { "name": "https://security.netapp.com/advisory/ntap-20201113-0006/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201113-0006/" }, { "name": "FEDORA-2020-14fda1bf85", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/" }, { "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-8698", "datePublished": "2020-11-12T18:01:55", "dateReserved": "2020-02-06T00:00:00", "dateUpdated": "2024-08-04T10:03:46.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-24511
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20210611-0005/ | x_refsource_CONFIRM | |
https://www.debian.org/security/2021/dsa-4934 | vendor-advisory, x_refsource_DEBIAN | |
https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html | mailing-list, x_refsource_MLIST | |
https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf | x_refsource_CONFIRM |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) Processors |
Version: See references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:12:09.012Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0005/" }, { "name": "DSA-4934", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2021/dsa-4934" }, { "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Processors", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "information disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-10T11:06:39", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0005/" }, { "name": "DSA-4934", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2021/dsa-4934" }, { "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-24511", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Processors", "version": { "version_data": [ { "version_value": "See references" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "information disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00464.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210611-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210611-0005/" }, { "name": "DSA-4934", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2021/dsa-4934" }, { "name": "[debian-lts-announce] 20210726 [SECURITY] [DLA 2718-1] intel-microcode security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/07/msg00022.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-24511", "datePublished": "2021-06-09T18:53:53", "dateReserved": "2020-08-19T00:00:00", "dateUpdated": "2024-08-04T15:12:09.012Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8696
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0006/ | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html | mailing-list, x_refsource_MLIST |
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Intel(R) Processors |
Version: See references |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:46.371Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0006/" }, { "name": "FEDORA-2020-14fda1bf85", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/" }, { "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Processors", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "information disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-05T20:06:12", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0006/" }, { "name": "FEDORA-2020-14fda1bf85", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/" }, { "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-8696", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Processors", "version": { "version_data": [ { "version_value": "See references" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "information disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381" }, { "name": "https://security.netapp.com/advisory/ntap-20201113-0006/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201113-0006/" }, { "name": "FEDORA-2020-14fda1bf85", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/" }, { "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-8696", "datePublished": "2020-11-12T18:02:06", "dateReserved": "2020-02-06T00:00:00", "dateUpdated": "2024-08-04T10:03:46.371Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }