Vulnerabilites related to supermicro - x10srl
Vulnerability from fkie_nvd
Published
2018-07-09 18:29
Modified
2024-11-21 03:47
Summary
Certain Supermicro X11S, X10, X9, X8SI, K1SP, C9X299, C7, B1, A2, and A1 products have a misconfigured Descriptor Region, allowing OS programs to modify firmware.
Impacted products
Vendor Product Version
supermicro x11ssz_firmware -
supermicro x11ssz -
supermicro x11ssv_firmware -
supermicro x11ssv -
supermicro x11ssql_firmware -
supermicro x11ssql -
supermicro x11ssq_firmware -
supermicro x11ssq -
supermicro x11ssn_firmware -
supermicro x11ssn -
supermicro x11srm_firmware -
supermicro x11srm -
supermicro x11sra_firmware -
supermicro x11sra -
supermicro x11sba_firmware -
supermicro x11sba -
supermicro x11sat_firmware -
supermicro x11sat -
supermicro x11sae_m_firmware -
supermicro x11sae_m -
supermicro x11sae_firmware -
supermicro x11sae -
supermicro x10srw_firmware -
supermicro x10srw -
supermicro x10srm_firmware -
supermicro x10srm -
supermicro x10srl_firmware -
supermicro x10srl -
supermicro x10sri_firmware -
supermicro x10sri -
supermicro x10srh_firmware -
supermicro x10srh -
supermicro x10srg_firmware -
supermicro x10srg -
supermicro x10srd_firmware -
supermicro x10srd -
supermicro x10sra_firmware -
supermicro x10sra -
supermicro x10sdvt_firmware -
supermicro x10sdvt -
supermicro x10sdvf_firmware -
supermicro x10sdvf -
supermicro x10sde_firmware -
supermicro x10sde -
supermicro x10sddf_firmware -
supermicro x10sddf -
supermicro x10sba_firmware -
supermicro x10sba -
supermicro x10qrh_firmware -
supermicro x10qrh -
supermicro x10dsn_firmware -
supermicro x10dsn -
supermicro x10dscp_firmware -
supermicro x10dscp -
supermicro x10dsc_firmware -
supermicro x10dsc -
supermicro x10drx_firmware -
supermicro x10drx -
supermicro x10drwn_firmware -
supermicro x10drwn -
supermicro x10drw_firmware -
supermicro x10drw -
supermicro x10drux_firmware -
supermicro x10drux -
supermicro x10drul_firmware -
supermicro x10drul -
supermicro x10dru_firmware -
supermicro x10dru -
supermicro x10drts_firmware -
supermicro x10drts -
supermicro x10drtps_firmware -
supermicro x10drtps -
supermicro x10drtl_firmware -
supermicro x10drtl -
supermicro x10drth_firmware -
supermicro x10drth -
supermicro x10drtb_firmware -
supermicro x10drtb -
supermicro x10drt_firmware -
supermicro x10drt -
supermicro x10drs_firmware -
supermicro x10drs -
supermicro x10drln_firmware -
supermicro x10drln -
supermicro x10drlc_firmware -
supermicro x10drlc -
supermicro x10drl_firmware -
supermicro x10drl -
supermicro x10dri1_firmware -
supermicro x10dri1 -
supermicro x10drh4_firmware -
supermicro x10drh4 -
supermicro x10drh_firmware -
supermicro x10drh -
supermicro x10drgo_firmware -
supermicro x10drgo -
supermicro x10drgh_firmware -
supermicro x10drgh -
supermicro x10drg_firmware -
supermicro x10drg -
supermicro x10drfr_firmware -
supermicro x10drfr -
supermicro x10drfg_firmware -
supermicro x10drfg -
supermicro x10drff_firmware -
supermicro x10drff -
supermicro x10drdl_firmware -
supermicro x10drdl -
supermicro x10drd_firmware -
supermicro x10drd -
supermicro x10drc_firmware -
supermicro x10drc -
supermicro x10dgo_firmware -
supermicro x10dgo -
supermicro x10ddwn_firmware -
supermicro x10ddwn -
supermicro x10ddwi_firmware -
supermicro x10ddwi -
supermicro x10ddw4_firmware -
supermicro x10ddw4 -
supermicro x10ddw3_firmware -
supermicro x10ddw3 -
supermicro x10dax_firmware -
supermicro x10dax -
supermicro x10dali_firmware -
supermicro x10dali -
supermicro x10dal_firmware -
supermicro x10dal -
supermicro x10dai_firmware -
supermicro x10dai -
supermicro b10drt_firmware -
supermicro b10drt -
supermicro b10dri_firmware -
supermicro b10dri -
supermicro b10drg_firmware -
supermicro b10drg -
supermicro x9sae_firmware -
supermicro x9sae -
supermicro x9drth_firmware -
supermicro x9drth -
supermicro x9drgqf_firmware -
supermicro x9drgqf -
supermicro x9drffp_firmware -
supermicro x9drffp -
supermicro x9drf_firmware -
supermicro x9drf -
supermicro x9dbl_firmware -
supermicro x9dbl -
supermicro x8siu_firmware -
supermicro x8siu -
supermicro x8sit_firmware -
supermicro x8sit -
supermicro x8sil_firmware -
supermicro x8sil -
supermicro x8sie_firmware -
supermicro x8sie -
supermicro x8sia_firmware -
supermicro x8sia -
supermicro k1spi_firmware -
supermicro k1spi -
supermicro k1spes_firmware -
supermicro k1spes -
supermicro c9x299_firmware -
supermicro c9x299 -
supermicro c7z97oc_firmware -
supermicro c7z97oc -
supermicro c7z97mf_firmware -
supermicro c7z97mf -
supermicro c7z87oc_firmware -
supermicro c7z87oc -
supermicro c7z370l_firmware -
supermicro c7z370l -
supermicro c7z370i_firmware -
supermicro c7z370i -
supermicro c7z270p_firmware -
supermicro c7z270p -
supermicro c7z270m_firmware -
supermicro c7z270m -
supermicro c7z270l_firmware -
supermicro c7z270l -
supermicro c7z270cg_firmware -
supermicro c7z270cg -
supermicro c7z270c_firmware -
supermicro c7z270c -
supermicro c7z170oce_firmware -
supermicro c7z170oce -
supermicro c7z170o_firmware -
supermicro c7z170o -
supermicro c7z170_firmware -
supermicro c7z170 -
supermicro c7x99oc_firmware -
supermicro c7x99oc -
supermicro c7q270_firmware -
supermicro c7q270 -
supermicro c7h270_firmware -
supermicro c7h270 -
supermicro c7b250_firmware -
supermicro c7b250 -
supermicro b1sd2tf_firmware -
supermicro b1sd2tf -
supermicro b1sa4_firmware -
supermicro b1sa4 -
supermicro b1dri_firmware -
supermicro b1dri -
supermicro a2sav_firmware -
supermicro a2sav -
supermicro a2sap_firmware -
supermicro a2sap -
supermicro a2san_firmware -
supermicro a2san -
supermicro a1srm_firmware -
supermicro a1srm -
supermicro a1sam_firmware -
supermicro a1sam -
supermicro a1sai1_firmware -
supermicro a1sai1 -
supermicro a1sai_firmware -
supermicro a1sai -
supermicro a1sa_firmware -
supermicro a1sa -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x11ssz_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAB9F2A3-7D94-49C8-823F-3E95243E2F31",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x11ssz:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04714011-A96D-4484-BEDA-9A53706430B7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x11ssv_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77776994-A531-4F49-9B0E-31A7B9771147",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x11ssv:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C664084D-E54D-4B00-8E36-AFEE0F6CDA60",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x11ssql_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CE6D073-D1B2-4D53-A1CB-4802D487A5AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x11ssql:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "937610BE-A3FC-4BAD-A14A-44137929A404",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x11ssq_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C73722-03FD-4CC9-A725-0483DB226A7F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x11ssq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8573A582-A52A-4006-99F0-D42C3AE5B722",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x11ssn_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "072220C7-8F37-4350-BD72-0A193496BEDE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x11ssn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "826C77E1-C930-477F-8694-2677DA99EF82",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x11srm_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7158E54-6309-4193-988E-9820E3AA30AB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x11srm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "990A3777-CC78-4E38-8319-6DA6FC52E9B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x11sra_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E39203A1-A9AB-424D-84D3-0944B2A73A21",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x11sra:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD640185-AC03-4235-A8BF-F71473A3D21B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x11sba_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67F06F62-6B10-4EB6-AB0A-880ED22DCAEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x11sba:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3193A03D-681C-4E22-8B48-D0DAF9DAECDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x11sat_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B53B1B53-E3E2-4984-B9ED-63A759A0F74D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x11sat:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3F363C3-ACFB-4A15-9076-1C03E92DB138",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x11sae_m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C60E22BF-4E5C-4C05-863D-111AE5B6623E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x11sae_m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53EE220D-2D20-4CE8-A1BE-5DB2DA5573EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x11sae_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8E6068C-E47A-41B5-B978-A84DD95EE312",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x11sae:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "450DA6E7-7E1B-4E3F-916D-A04E8A64C9E0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10srw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EF0055F-4E06-4A57-97B8-55D9878FFD83",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10srw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C5308B7-FE4F-42E8-A937-04EE635E0234",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10srm_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D317771-F0E4-4323-87A0-0E4989084839",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10srm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3C74651-E5B6-437D-B74E-E6BA883E80BD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10srl_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ABD64D1-92FB-4064-8E5D-D33BFF7CE198",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10srl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D3970F0-1BD9-44DB-95B7-20438AA7485B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10sri_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92B7B4C2-7D7E-4680-B5B2-0263CB108285",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10sri:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08E3D690-F563-49AD-93BD-F7CDB9B6BACB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10srh_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B56CEC23-E467-4225-9EB1-FA958ED07DF4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10srh:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E0A69B4-E464-4FC0-A82B-2413910C6911",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10srg_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BF085AF-5A67-4DFC-8117-836C288214BF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10srg:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE748D9E-2755-40F4-A1B4-9931630BE922",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10srd_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27005E19-5960-4D25-A674-2471902D0090",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10srd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B763E171-5291-47D5-A508-9D74BE0B3ADF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10sra_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "869A9C84-688C-414E-A469-C9BC0C0697CF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10sra:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3E99E49-D2C0-4FE0-9D9E-87E11B5EEC8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10sdvt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAE1C503-4712-4364-B703-E00C04391021",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10sdvt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83A81ED4-E593-473A-A897-4493A6B7D107",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10sdvf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB2BFD26-B627-482C-8DA9-23E8A278E3B9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10sdvf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E16A815D-D333-4AE0-AE5A-CAEA53515A1A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10sde_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB3F3A0D-C147-4C01-B266-9D2A8F0723EC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10sde:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "633DB2D8-229B-4C2B-A7B3-1CD0659FD7FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10sddf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C78063F3-1642-4217-8D07-DB5BBE42E3B1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10sddf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B91F0A71-EA47-4D02-9543-4735F3A0A79F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10sba_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADCD877B-6903-4553-B575-46A0EDA4818A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10sba:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C04BFC5-F15E-430D-83AA-488E095B018F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10qrh_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "981C523D-F935-4342-BC61-4E3ACB82886F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10qrh:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA093973-E2EB-43E9-9990-84E2ABD51218",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10dsn_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DD8458C-E8C1-499F-876D-BA1C7A67ECD2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10dsn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13987C89-E018-467D-8006-CAC244C5EEE4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10dscp_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3903E90C-74AD-4B51-AF28-ADD6E6FFA30E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10dscp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0DA261A-55F5-47A8-B4B6-EA1E6C36EA2A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10dsc_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "75A7923D-7EAA-4631-9322-BDA07EF70CC8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10dsc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BA11F78-60BD-48F8-8BC0-7DA6B9D3F27B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08670542-14D2-480B-ABDC-558B26FBF0B2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "412F5061-D07A-42D6-8EBA-9DA03C410DE3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drwn_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69824588-2031-4B5F-99A2-0978E9CFB520",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drwn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF0E77A7-3C0E-489E-989C-D68C63AA5B7D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drw_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9886B7DF-C32E-4F80-A9C3-E524670FDF19",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drw:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4DED0D1-D3A9-4357-B280-26A1B6442429",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drux_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF86124F-3CDC-4C64-8DB3-6259D5FB5D6F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drux:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5AD8350-5285-46A2-9657-D428002C7014",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drul_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "95033A95-CBB7-40CC-B793-1971F17B7574",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drul:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D3A94A0-89CC-4D91-89D7-6A01AB661225",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10dru_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99431209-6788-4E43-B096-636F284E6B5C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10dru:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD1163ED-26C9-43B6-8096-265460766A24",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drts_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C08F18DC-32DD-4EE5-8CF6-C67AC7F67F1A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC527E35-8EE4-45B4-825B-4988D85058F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drtps_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6B57929-9F08-4991-ACBF-ECFBF2D05C50",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drtps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "612934D5-DD2E-4ED2-8E89-EE3A77C7E28E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drtl_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA03DCC2-7102-4294-8376-9C7EA7957263",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drtl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F30D404C-9293-43BC-9858-47413302A879",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drth_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B39C0864-97B7-4F56-851B-DABA00E18D70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drth:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BD3AF10-9C12-4B05-B6CD-939BDB362388",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drtb_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B787BBDC-30CE-42B9-B356-42122B866D43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drtb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ABB99B2-F5D6-4500-B0EB-981BDA383014",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B14D7FE-A06B-4E02-B023-FD7B01E7C732",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1128B555-AB97-48BB-97BE-73AAAD4C1040",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06E4E9BC-D6FE-4079-ADC9-C7F3938480D7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F5E800D-5584-4222-9C0E-971FB92CB51F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drln_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5DDD7A1-47AA-4E8F-B07E-84298ADBDB8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drln:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D572352-8CA2-4EA0-9F88-D6DB6E44041E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drlc_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2274C41-DBAC-4998-AC62-A862A9DA9CCD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drlc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDC447C7-0190-4E57-933F-DBD9217935C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drl_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36BA7725-EAAA-4F58-91D2-B7A58B36A4E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78F7B91B-1A28-4216-9AA3-B8271CD7BF93",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10dri1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1D1F4C0-9146-4D2F-8DF5-918ACE6225A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10dri1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC1809A3-E035-4422-AD19-D45B570D0CB0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drh4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7477BAD-4679-4188-B107-35C632D7335A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drh4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6979ACC5-F66C-442A-B34F-1E640D603AD7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drh_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A01C32D2-10B3-4195-9069-09E4D0890BCD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drh:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32509C68-8C33-4918-88E8-E8B78F600A07",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drgo_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F147AE2-5596-490E-90EE-1073CBFAD504",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drgo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E5719F9-326C-4AD7-A2AF-96CA8BCE75E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drgh_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5D55C72-8E93-4DD2-9F74-FCE2FD130589",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drgh:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9393C46-C46E-4630-81AE-E1D4E0BB908B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drg_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE8C40F1-7EF5-4515-9673-BC45F06BBC8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drg:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23D8A728-2B3F-4E86-8BC0-67392DCEBB46",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drfr_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BF0CFFA-A939-4748-8457-CB994F8759AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8383900B-6625-4989-AC88-954F44C9359A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drfg_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43BBE485-3C36-46F4-A0A6-8B0D7762D637",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drfg:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A98BBEEB-5C03-4685-BF78-FEB80C3FF794",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drff_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0909C769-4AAA-4F83-9B0D-35C8E284DE51",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drff:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82CB80E-6037-4B80-B906-259F75F195B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drdl_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB91DE2-7FC2-4318-B186-DF35615DB038",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drdl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62B15845-83A2-4103-AC01-2E6D7FD4E738",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drd_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "652B7DCF-3825-4504-B21A-C6E4C546494B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42BF525B-E378-4A99-9D00-F28BCD7EA0FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10drc_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F92AA5C-459C-428F-8AC2-CA4EB1CCD12E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10drc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01C27BD5-8681-4463-85E1-91728827E6E3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10dgo_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F660E5-F0DB-4ACB-B7A7-2629B84BA77B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10dgo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7669B71-5F8A-433C-8799-17D75E8ADD96",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10ddwn_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBF6789D-16EF-465D-AF79-4C8BD2CB0B84",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10ddwn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED452383-45F6-4E5B-8A5A-A7832A0F8746",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10ddwi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C10FDF52-E6B6-4C71-A5AF-849B1B3E1425",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10ddwi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD980B02-7A17-45EB-8FC4-8F4172CB2003",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10ddw4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "474C92FA-81E1-4200-AF95-7006A9938586",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10ddw4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D25C297-3AEB-4A77-BC8C-0E244AE49109",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10ddw3_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52930282-4839-4619-A6D7-5852C2A0A149",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10ddw3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2810FC7C-ACAF-43AD-8B20-19CEB7D13E47",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10dax_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "412BB399-A37B-4E49-95E5-7487C9DB40A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10dax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EC49514-20E5-4D95-BF4C-B53FF21EEF18",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10dali_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D81E5D9-23E9-4A12-92DF-11195D6F628F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10dali:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7812B9D5-FE0C-45F3-920C-256899AD4C6A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10dal_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "546BC12E-DDBE-48A5-A713-582C2FE050AA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10dal:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DEBD20E-C807-41F4-BA87-9BA86EF29125",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x10dai_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65247D7C-2765-438A-91B0-E211A6A6228A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x10dai:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECE31AB2-01FD-4AB6-9BA4-4AA4F923639E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:b10drt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "55ABC505-CB44-4E26-9CCA-E859BDE87613",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:b10drt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC9E231F-0279-40AE-B323-83F39ACEA29B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:b10dri_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8541D20-0583-408D-96DE-0AD6232786E3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:b10dri:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF3DA9E8-4A49-40B3-BB89-0B7FCFA911A3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:b10drg_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "338949D4-C007-40DF-97EE-3FE7E534271F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:b10drg:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "387F1F28-15B6-48BF-BACE-5E594A2F5A54",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x9sae_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE4F5979-E6DA-4DEF-AB8A-7F2304E63B88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x9sae:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0DEEBED-CD3A-48D5-B15F-B77D8D01CB79",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x9drth_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A02631FB-DFE4-46F5-91F2-4D3FF0635525",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x9drth:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A496EF45-96B0-472F-B29F-E4F7078F44AB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x9drgqf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "962D18F7-9021-4789-A1B9-FCF1008F66CB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x9drgqf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3462E962-6AC3-41BB-841E-790780875431",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x9drffp_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83EA231E-C6CF-4A7E-831C-605FE7A986D5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x9drffp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "940A2D56-E838-4020-94CB-E5A39DFF1833",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x9drf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "118EA2BB-3DDD-4FFF-B9F4-5FD51D08AAEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x9drf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51DCDC4A-6A13-4487-8AFD-5D5DF6D2B40D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x9dbl_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D060B8D9-EC0F-4AB6-9B1E-D78DBD084B81",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x9dbl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D5E482C-BA80-42F9-AF75-08D59EFB0405",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x8siu_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "402723A8-BB09-41F7-8E48-AB73DA824650",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x8siu:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "667531C9-E5C6-4A6F-993B-8D06730F38B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x8sit_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5245B30-F2BD-40C5-8B17-BDE58DB7B35F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x8sit:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47E18F2D-58E9-45FF-AAA8-2913C81D872B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x8sil_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A09A9B8-3AFF-46B6-8A04-2D660CFA193A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x8sil:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A179F26D-9751-4518-B284-4127FF6CD7C9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x8sie_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FBB5C74-CEA5-4754-B13A-EA653EE9B617",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x8sie:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9179D6A6-3769-4878-8147-63D967F1B1D7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:x8sia_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06C3DE92-233D-4DBA-939E-E7E59ECD4F86",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:x8sia:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D538C7EA-20DD-47F3-B73D-0C1D46B32C9D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:k1spi_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14E9160E-9B81-4D4F-AC41-0F7E4AC3E957",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:k1spi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ED5716-1233-4F55-A1B7-7CE8CD1EAE62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:k1spes_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFB7192B-09A4-4EB1-B033-135B4ADB006C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:k1spes:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB866691-BECC-4996-9D07-DE0D4438353B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:c9x299_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98BA2E56-2C57-4A16-B6DC-F7F05BAE045F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:c9x299:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABDDB590-9AE7-4006-ABB6-0AF990033311",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:c7z97oc_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACC6996-FA12-4618-9D92-68B1AB778C49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:c7z97oc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45ED8FA3-8FAD-42FC-AC6E-AA57F161E35E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:c7z97mf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01E3D07C-CBFE-4195-9DD4-76DC052B4A7A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:c7z97mf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92F47955-3B41-466F-B1C5-85E54133563C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:c7z87oc_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97C2265D-A67F-4E47-A134-F2797813F84A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:c7z87oc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F90CF17F-7FFF-4164-BE34-749E6F69BD98",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:c7z370l_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "58239A90-8F4E-42C3-A929-C49EDD1BD8B1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:c7z370l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C3AF312-8334-4983-89BC-7FDC6A4B73A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:c7z370i_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAC512D6-EBDB-494B-BCC1-DEAFDC459E5B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:c7z370i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9C4047B-7700-4609-9B95-0186789F6ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:c7z270p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6325C90-4543-4909-9516-00870AD0D026",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:c7z270p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3116DB9D-BC60-44B9-B7E1-483DA4150B12",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:c7z270m_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB7B0BBA-A56F-48D1-8FBE-986E86AC8559",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:c7z270m:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F93E0D80-CDBC-4EDB-A985-C7F8A7AD76C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:c7z270l_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9536365F-0285-4D69-B10F-84FCC200AD9F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:c7z270l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "599256BC-F69A-427A-B32B-3942F5D3C6A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:c7z270cg_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F99E9466-64F7-4104-B0AA-94ED54F68EDD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:c7z270cg:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F43FD0F-A1F1-41AF-AC88-102EFF1B8C27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:c7z270c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D82646B2-E187-402B-9735-49F0AD85C380",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:c7z270c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "506E7DF5-A846-4416-9F53-3E2FE23EDA9A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:c7z170oce_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5F30EFD-C84B-49B2-9F84-C9B4F2E66046",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:c7z170oce:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B0C8FD3-8276-478C-845C-7647EDFFCDB6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:c7z170o_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9474E49E-71D7-4D13-82CB-895E1573CEAE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:c7z170o:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF8399F8-0EB7-4C4C-B8AB-532EB39E70C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:c7z170_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "219C4520-B539-41CC-9896-0754C50A1EBF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:c7z170:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA93030B-4373-470A-89F5-C46BB2B9D9AF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:c7x99oc_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E565DBB-3791-410F-A1B9-DF56AAE417AD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:c7x99oc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65C1D144-7097-4F34-B62F-E6D21C6906D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:c7q270_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD578C73-584D-4AEF-A451-E281E279834A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:c7q270:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AE68818-27A5-4D97-9CB0-9D732C2CAEE8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:c7h270_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FCFE975-1882-404E-A9BD-68AD9271BBE7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:c7h270:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A23588EC-C915-47A9-BE90-2A70D9A1F016",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:c7b250_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3850319-92C7-4CF8-AF28-F70A755D1982",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:c7b250:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E233B93F-303C-43A7-92EF-DEFE1D7940C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:b1sd2tf_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08C12D0-0C47-4BFD-8177-CDE8C92E5090",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:b1sd2tf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC9D8A51-065B-4337-887F-CE81C091FC86",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:b1sa4_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "907B88E7-1816-44C5-B7B7-5D9D390FFE76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:b1sa4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E89E525-1B61-4B87-86EE-28F1BB6E49C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:b1dri_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5524D6B-87CD-4452-BC0E-39F073E10D6C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:b1dri:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F71AA8CF-35F4-4600-86E7-25465731448F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:a2sav_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C458BEF2-878C-4A65-BF36-B84D276219FA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:a2sav:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79376EDA-F638-432D-869D-E5995E08073E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:a2sap_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80D2769E-0BF8-4091-9062-B8585E48A440",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:a2sap:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "058A0B0B-4572-40A6-A2D0-5759D5BA0CE2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:a2san_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9E91980-04B7-4C7E-A6E7-20ED244D639D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:a2san:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B493522D-E9AE-40F9-BC61-5281B54E5ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:a1srm_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D7F2098-D169-4604-9FEC-EF342773C2E5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:a1srm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39535235-4627-4FC4-A6C4-446132140D02",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:a1sam_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C4B79B9-8CF2-454C-B5B2-A6BEC172A366",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:a1sam:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94A6519B-FBC4-457E-B2CB-061E545D1877",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:a1sai1_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F137E181-6894-4258-B2E9-DAB95730613B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:a1sai1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D433048-97B6-494F-8DDD-AC8A446B4671",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:a1sai_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "416A5474-47AE-4AF3-9896-BC1D386D45A5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:a1sai:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAD4C9BC-CAC8-4744-8E81-89BAD5182468",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:supermicro:a1sa_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E14DFA96-B804-44A3-BC18-DFC2D48CA192",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:supermicro:a1sa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "06096D28-37F0-424B-B071-DB3ED87E13E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Certain Supermicro X11S, X10, X9, X8SI, K1SP, C9X299, C7, B1, A2, and A1 products have a misconfigured Descriptor Region, allowing OS programs to modify firmware."
    },
    {
      "lang": "es",
      "value": "Ciertos productos Supermicro X11S, X10, X9, X8SI, K1SP, C9X299, C7, B1, A2 y A1 tienen un error de configuraci\u00f3n en el descriptor de regi\u00f3n, lo que permite que los programas del sistema operativo modifiquen el firmware."
    }
  ],
  "id": "CVE-2018-13787",
  "lastModified": "2024-11-21T03:47:59.033",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-07-09T18:29:00.560",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://blog.eclypsium.com/2018/06/07/firmware-vulnerabilities-in-supermicro-systems/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.bleepingcomputer.com/news/security/firmware-vulnerabilities-disclosed-in-supermicro-server-products/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.supermicro.com/support/security_Intel-SA-00088.cfm?pg=X10#tab"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://blog.eclypsium.com/2018/06/07/firmware-vulnerabilities-in-supermicro-systems/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.bleepingcomputer.com/news/security/firmware-vulnerabilities-disclosed-in-supermicro-server-products/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.supermicro.com/support/security_Intel-SA-00088.cfm?pg=X10#tab"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2018-13787
Vulnerability from cvelistv5
Published
2018-07-09 18:00
Modified
2024-08-05 09:14
Severity ?
Summary
Certain Supermicro X11S, X10, X9, X8SI, K1SP, C9X299, C7, B1, A2, and A1 products have a misconfigured Descriptor Region, allowing OS programs to modify firmware.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T09:14:47.218Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://blog.eclypsium.com/2018/06/07/firmware-vulnerabilities-in-supermicro-systems/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.bleepingcomputer.com/news/security/firmware-vulnerabilities-disclosed-in-supermicro-server-products/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.supermicro.com/support/security_Intel-SA-00088.cfm?pg=X10#tab"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-07-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Certain Supermicro X11S, X10, X9, X8SI, K1SP, C9X299, C7, B1, A2, and A1 products have a misconfigured Descriptor Region, allowing OS programs to modify firmware."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-07-09T17:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://blog.eclypsium.com/2018/06/07/firmware-vulnerabilities-in-supermicro-systems/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.bleepingcomputer.com/news/security/firmware-vulnerabilities-disclosed-in-supermicro-server-products/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.supermicro.com/support/security_Intel-SA-00088.cfm?pg=X10#tab"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-13787",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Certain Supermicro X11S, X10, X9, X8SI, K1SP, C9X299, C7, B1, A2, and A1 products have a misconfigured Descriptor Region, allowing OS programs to modify firmware."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://blog.eclypsium.com/2018/06/07/firmware-vulnerabilities-in-supermicro-systems/",
              "refsource": "MISC",
              "url": "https://blog.eclypsium.com/2018/06/07/firmware-vulnerabilities-in-supermicro-systems/"
            },
            {
              "name": "https://www.bleepingcomputer.com/news/security/firmware-vulnerabilities-disclosed-in-supermicro-server-products/",
              "refsource": "MISC",
              "url": "https://www.bleepingcomputer.com/news/security/firmware-vulnerabilities-disclosed-in-supermicro-server-products/"
            },
            {
              "name": "https://www.supermicro.com/support/security_Intel-SA-00088.cfm?pg=X10#tab",
              "refsource": "MISC",
              "url": "https://www.supermicro.com/support/security_Intel-SA-00088.cfm?pg=X10#tab"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-13787",
    "datePublished": "2018-07-09T18:00:00",
    "dateReserved": "2018-07-09T00:00:00",
    "dateUpdated": "2024-08-05T09:14:47.218Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

var-201807-0788
Vulnerability from variot

Certain Supermicro X11S, X10, X9, X8SI, K1SP, C9X299, C7, B1, A2, and A1 products have a misconfigured Descriptor Region, allowing OS programs to modify firmware. plural Supermicro The product contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Supermicro X11S and so on are different series of computer motherboards from Supermicro Computer in the United States. A security vulnerability exists in several Supermicro products. The vulnerability originates from a program with a misconfigured Descriptor Region. An attacker could exploit this vulnerability with the help of an operating system program to modify the firmware

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201807-0788",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "x10qrh",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10dsc",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10sba",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x11sat",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10sde",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x11sba",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10dscp",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10sddf",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10dsn",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drx",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10srw",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "c7z370l",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "c7z270l",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "c7z170",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "b10dri",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x9drffp",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "a2san",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "c7z270p",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x11srm",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drtl",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drwn",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drln",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "c7z170oce",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10srg",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drul",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "b1dri",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drgh",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drtb",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "a1srm",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "a1sai1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "c9x299",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "a1sai",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10sra",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "c7q270",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drfg",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10ddwn",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "a1sam",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "c7z97mf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x11ssql",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10dri1",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x11ssz",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10srl",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "b10drg",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drh4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10dru",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10dal",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x9sae",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x8sie",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drff",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x8sit",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10dai",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drts",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "a2sav",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10srh",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "c7x99oc",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10srm",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drg",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x11sae",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drth",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drl",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10ddw4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10dax",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x9drgqf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drtps",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "c7z270c",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10dali",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x8sia",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x9drf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10dgo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x9dbl",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x8siu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10sdvf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x9drth",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x11ssv",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "a2sap",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "b10drt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x8sil",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10ddw3",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "c7z370i",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "c7h270",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "b1sd2tf",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x11ssq",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "c7z270cg",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "c7z170o",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10ddwi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10sdvt",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "a1sa",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drlc",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "b1sa4",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x11sae m",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x11sra",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drgo",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "c7z97oc",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "c7z87oc",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10srd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "c7b250",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drdl",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "k1spes",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drw",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "k1spi",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "c7z270m",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x11ssn",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drs",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drc",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10sri",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drh",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "x10drfr",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "supermicro",
        "version": null
      },
      {
        "model": "a1srm",
        "scope": null,
        "trust": 0.8,
        "vendor": "super micro computer",
        "version": null
      },
      {
        "model": "a2sav",
        "scope": null,
        "trust": 0.8,
        "vendor": "super micro computer",
        "version": null
      },
      {
        "model": "b1sd2tf",
        "scope": null,
        "trust": 0.8,
        "vendor": "super micro computer",
        "version": null
      },
      {
        "model": "c7z97oc",
        "scope": null,
        "trust": 0.8,
        "vendor": "super micro computer",
        "version": null
      },
      {
        "model": "c9x299",
        "scope": null,
        "trust": 0.8,
        "vendor": "super micro computer",
        "version": null
      },
      {
        "model": "k1spi",
        "scope": null,
        "trust": 0.8,
        "vendor": "super micro computer",
        "version": null
      },
      {
        "model": "x10swr",
        "scope": null,
        "trust": 0.8,
        "vendor": "super micro computer",
        "version": null
      },
      {
        "model": "x11ssz",
        "scope": null,
        "trust": 0.8,
        "vendor": "super micro computer",
        "version": null
      },
      {
        "model": "x8siu",
        "scope": null,
        "trust": 0.8,
        "vendor": "super micro computer",
        "version": null
      },
      {
        "model": "x9sae",
        "scope": null,
        "trust": 0.8,
        "vendor": "super micro computer",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007980"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-488"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-13787"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:supermicro:a1srm_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:supermicro:a2sav_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:supermicro:b1sd2tf_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:supermicro:c7z97oc_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:supermicro:c9x299_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:supermicro:k1spi_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:supermicro:x10srw_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:supermicro:x11ssz_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:supermicro:x8siu_firmware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:supermicro:x9sae_firmware",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007980"
      }
    ]
  },
  "cve": "CVE-2018-13787",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "CVE-2018-13787",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "LOCAL",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.2,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 3.9,
            "id": "VHN-123881",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "author": "nvd@nist.gov",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 0.8,
            "id": "CVE-2018-13787",
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "trust": 1.8,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2018-13787",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "NVD",
            "id": "CVE-2018-13787",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201807-488",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "VULHUB",
            "id": "VHN-123881",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-123881"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007980"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-488"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-13787"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Certain Supermicro X11S, X10, X9, X8SI, K1SP, C9X299, C7, B1, A2, and A1 products have a misconfigured Descriptor Region, allowing OS programs to modify firmware. plural Supermicro The product contains an access control vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Supermicro X11S and so on are different series of computer motherboards from Supermicro Computer in the United States. A security vulnerability exists in several Supermicro products. The vulnerability originates from a program with a misconfigured Descriptor Region. An attacker could exploit this vulnerability with the help of an operating system program to modify the firmware",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2018-13787"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007980"
      },
      {
        "db": "VULHUB",
        "id": "VHN-123881"
      }
    ],
    "trust": 1.71
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2018-13787",
        "trust": 2.5
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007980",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-488",
        "trust": 0.7
      },
      {
        "db": "VULHUB",
        "id": "VHN-123881",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-123881"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007980"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-488"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-13787"
      }
    ]
  },
  "id": "VAR-201807-0788",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-123881"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T23:05:04.236000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "X10 Gen. Listing",
        "trust": 0.8,
        "url": "https://www.supermicro.com/support/security_Intel-SA-00088.cfm?pg=X10#tab"
      },
      {
        "title": "Multiple Supermicro Product security vulnerabilities",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=84006"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007980"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-488"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      },
      {
        "problemtype": "CWE-284",
        "trust": 0.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-123881"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007980"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-13787"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "https://blog.eclypsium.com/2018/06/07/firmware-vulnerabilities-in-supermicro-systems/"
      },
      {
        "trust": 1.7,
        "url": "https://www.bleepingcomputer.com/news/security/firmware-vulnerabilities-disclosed-in-supermicro-server-products/"
      },
      {
        "trust": 1.7,
        "url": "https://www.supermicro.com/support/security_intel-sa-00088.cfm?pg=x10#tab"
      },
      {
        "trust": 0.8,
        "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-13787"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2018-13787"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/docview.wss?uid=ibm10869134"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-123881"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007980"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-488"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-13787"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-123881"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007980"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-488"
      },
      {
        "db": "NVD",
        "id": "CVE-2018-13787"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2018-07-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-123881"
      },
      {
        "date": "2018-10-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-007980"
      },
      {
        "date": "2018-07-09T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201807-488"
      },
      {
        "date": "2018-07-09T18:29:00.560000",
        "db": "NVD",
        "id": "CVE-2018-13787"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2019-10-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-123881"
      },
      {
        "date": "2018-10-04T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2018-007980"
      },
      {
        "date": "2019-10-23T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201807-488"
      },
      {
        "date": "2024-11-21T03:47:59.033000",
        "db": "NVD",
        "id": "CVE-2018-13787"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "local",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-488"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural  Supermicro Access control vulnerabilities in products",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2018-007980"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201807-488"
      }
    ],
    "trust": 0.6
  }
}