CVE-2017-5691
Vulnerability from cvelistv5
Published
2017-07-26 15:00
Modified
2024-09-16 17:58
Severity ?
Summary
Incorrect check in Intel processors from 6th and 7th Generation Intel Core Processor Families, Intel Xeon E3-1500M v5 and v6 Product Families, and Intel Xeon E3-1200 v5 and v6 Product Families allows compromised system firmware to impact SGX security via incorrect early system state.
Impacted products
Vendor Product Version
Intel Corporation 6th and 7th Generation Intel Core Processor Families, Intel Xeon E3-1500M v5 and v6 Processor Families, and Intel Xeon E3-1200 v5 and v6 Product Families. Version: 6th and 7th Generation Intel Core Processor Families, Intel Xeon E3-1500M v5 and v6 Processor Families, and Intel Xeon E3-1200 v5 and v6 Product Families.
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T15:11:48.513Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00076\u0026languageid=en-fr"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.lenovo.com/us/en/product_security/LEN-15184"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesb3p03767en_us"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "6th and 7th Generation Intel Core Processor Families, Intel Xeon E3-1500M v5 and v6 Processor Families, and Intel Xeon E3-1200 v5 and v6 Product Families.",
          "vendor": "Intel Corporation",
          "versions": [
            {
              "status": "affected",
              "version": "6th and 7th Generation Intel Core Processor Families, Intel Xeon E3-1500M v5 and v6 Processor Families, and Intel Xeon E3-1200 v5 and v6 Product Families."
            }
          ]
        }
      ],
      "datePublic": "2017-07-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Incorrect check in Intel processors from 6th and 7th Generation Intel Core Processor Families, Intel Xeon E3-1500M v5 and v6 Product Families, and Intel Xeon E3-1200 v5 and v6 Product Families allows compromised system firmware to impact SGX security via incorrect early system state."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Elevation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-15T19:57:01",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00076\u0026languageid=en-fr"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.lenovo.com/us/en/product_security/LEN-15184"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesb3p03767en_us"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "DATE_PUBLIC": "2017-07-25T00:00:00",
          "ID": "CVE-2017-5691",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "6th and 7th Generation Intel Core Processor Families, Intel Xeon E3-1500M v5 and v6 Processor Families, and Intel Xeon E3-1200 v5 and v6 Product Families.",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "6th and 7th Generation Intel Core Processor Families, Intel Xeon E3-1500M v5 and v6 Processor Families, and Intel Xeon E3-1200 v5 and v6 Product Families."
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Intel Corporation"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Incorrect check in Intel processors from 6th and 7th Generation Intel Core Processor Families, Intel Xeon E3-1500M v5 and v6 Product Families, and Intel Xeon E3-1200 v5 and v6 Product Families allows compromised system firmware to impact SGX security via incorrect early system state."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Elevation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00076\u0026languageid=en-fr",
              "refsource": "CONFIRM",
              "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00076\u0026languageid=en-fr"
            },
            {
              "name": "https://support.lenovo.com/us/en/product_security/LEN-15184",
              "refsource": "CONFIRM",
              "url": "https://support.lenovo.com/us/en/product_security/LEN-15184"
            },
            {
              "name": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesb3p03767en_us",
              "refsource": "CONFIRM",
              "url": "https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesb3p03767en_us"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2017-5691",
    "datePublished": "2017-07-26T15:00:00Z",
    "dateReserved": "2017-02-01T00:00:00",
    "dateUpdated": "2024-09-16T17:58:24.342Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2017-5691\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2017-07-26T15:29:00.283\",\"lastModified\":\"2024-11-21T03:28:13.767\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Incorrect check in Intel processors from 6th and 7th Generation Intel Core Processor Families, Intel Xeon E3-1500M v5 and v6 Product Families, and Intel Xeon E3-1200 v5 and v6 Product Families allows compromised system firmware to impact SGX security via incorrect early system state.\"},{\"lang\":\"es\",\"value\":\"La comprobaci\u00f3n incorrecta en los procesadores Intel de las familias de procesadores Intel Core de 6a y 7a generaci\u00f3n, de las familias de productos Intel Xeon E3-1500M versiones v5 y v6, y de las familias de productos Intel Xeon E3-1200 versiones v5 y v6, permite que el firmware del sistema comprometido impacte la seguridad SGX por medio de un estado inicial incorrecto del sistema.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":9.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.3,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc7i3bnk_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"682EDAC2-F993-4401-B649-B5C49E3E1761\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc7i3bnk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A810CE8E-3B2C-458D-BAE4-BA3AEC4FA5CA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc7i5bnk_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"384BE426-912A-4BFD-8AE7-BEB0F941DF7B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc7i5bnk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBF91B19-0FA1-4CE8-B729-A09612466725\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc7i7bnh_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71D0E50D-B369-4C82-91DB-AD44A71736EE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc7i7bnh:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACBE1C0D-69EF-45B5-9E70-C4DBD0A401BF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stk2mv64cc_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3E5D206-247A-41BA-BAE6-83F482D1090A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stk2mv64cc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9497CA1C-A3CA-4CC4-8192-69DF58630575\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:stk2m3w64cc_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE204F78-8A38-4FC5-BCBF-6EB40015ABAE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:stk2m3w64cc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"123782EB-5B44-492A-86B1-D10C03C89D64\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc6i7kyk_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4414D9EF-D36D-4190-8581-3E0370764CA3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc6i7kyk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC196D3E-062A-4301-BAA8-51FAF153F2EB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc6i3syk_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A5C2391-2CD8-49F6-BDAE-B79670CEC3B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc6i3syk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"035B570B-8441-4F84-A441-FFBD1378EE6E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:nuc6i5syk_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EF24505-0212-4152-80FD-F80792E51E9C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:nuc6i5syk:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9AEC7B5-E79D-4CB0-8BA9-4ED6001603D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:r1304sposhor_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ECEC599-486C-45B6-9D5C-73CCDF1BD5BD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r1304sposhor:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3684B23-A791-43B9-8426-EE79463E9471\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:r1304sposhorr_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44FBDCDD-2015-45EE-BDFD-0876F20A58E6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r1304sposhorr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB43BBF2-C737-4246-8943-E21178192050\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:r1208sposhorr_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"921BA513-3719-4213-BB0B-96062C64459D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r1208sposhorr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2392C7B-4401-4ECF-9AF2-AED3B375DA1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:lr1304spcfg1r_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F05649F5-F879-434D-9BAC-AA95AA011DE6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:lr1304spcfg1r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"846E6438-E23A-4444-94C1-8E9326B53FC5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:r1208sposhor_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20CD2904-77C2-4F70-A187-469895E53B37\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r1208sposhor:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB4BADBE-93D4-44C6-8307-72A5351587F1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:s1200spsr_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93285F46-461A-4BA2-B195-A7869E194CDF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s1200spsr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B19990B5-8D2D-4A9F-B323-2E82B46ACAF3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:s1200spor_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0563A19E-8ABD-4652-B5CB-D64DBD96BD9B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s1200spor:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1F0421C-DD38-4FAD-8EA8-A264025A3C6D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:lr1304spcfg1_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59866E74-BB74-450C-8375-61C86FA6E261\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:lr1304spcfg1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3353F12-6B1E-479A-88A0-51315E377891\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:s1200spl_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EACE8E81-E786-4262-AAF5-738756B5E549\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s1200spl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFED93FA-650A-4908-9D22-DFA1013A9AF4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:s1200spo_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D7AF551-F825-4E09-AC7E-B94CB21B56D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s1200spo:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06306DD8-2347-4A9A-8A4A-2D283F784207\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:s1200sps_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59A87E1D-1BAF-4A11-894C-0FF1592B6561\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s1200sps:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB414F9E-02B4-4CD4-9534-35BD478A9598\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:r1304sposhbn_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEB2AA41-AB3A-41B4-AF30-B3970A5971D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r1304sposhbn:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1698F3C-7D8C-4C5F-AB32-4176E363EC77\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:s1200splr_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8245B6D7-B1E8-4B63-AA5D-E9C2BB132F75\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:s1200splr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB1CAD2B-7D17-4D75-9746-C6AF049F6C04\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:r1304sposhbnr_bios:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52415BC5-A21B-45E2-BE4D-9BF4FF9CB0A5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:r1304sposhbnr:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB06D22E-814F-4B2E-BDB6-E8ADB0EDC7EB\"}]}]}],\"references\":[{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesb3p03767en_us\",\"source\":\"secure@intel.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00076\u0026languageid=en-fr\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.lenovo.com/us/en/product_security/LEN-15184\",\"source\":\"secure@intel.com\"},{\"url\":\"https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesb3p03767en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00076\u0026languageid=en-fr\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.lenovo.com/us/en/product_security/LEN-15184\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.