Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2021-39298
Vulnerability from cvelistv5
Published
2022-02-16 16:38
Modified
2024-08-04 02:06
Severity ?
EPSS score ?
Summary
A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | AMD | 2nd Gen EPYC |
Version: Various |
|||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T02:06:42.610Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "tags": [ "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen 2000 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen 3000 Series ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen 5000 Series ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.\u003cbr\u003e\u003cbr\u003e" } ], "value": "A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-39298", "datePublished": "2022-02-16T16:38:10.726517Z", "dateReserved": "2021-08-19T00:00:00", "dateUpdated": "2024-08-04T02:06:42.610Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-39298\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2022-02-16T17:15:10.860\",\"lastModified\":\"2024-11-21T06:19:09.240\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.\\n\\n\"},{\"lang\":\"es\",\"value\":\"Una potencial vulnerabilidad en el manejador de interrupciones del Modo de Gesti\u00f3n del Sistema (SMM) de AMD puede permitir a un atacante con altos privilegios acceder al SMM resultando en la ejecuci\u00f3n de c\u00f3digo arbitrario que podr\u00eda ser utilizado por actores maliciosos para eludir los mecanismos de seguridad proporcionados en el firmware UEFI\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.0,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z1_entry_tower_g5_workstation_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"02.12.00\",\"matchCriteriaId\":\"6E3D0268-99F9-470C-A2C1-C8667BCE3828\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z1_entry_tower_g5_workstation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02EB5330-7C9B-4CE4-AF6B-18D0ED8D2D1D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z1_entry_tower_g6_workstation_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"02.10.00\",\"matchCriteriaId\":\"85837EF3-C3E4-4BFA-8416-2D237A6177C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z1_entry_tower_g6_workstation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0D9DCC9-8EB2-481E-BBAF-DD738E83AC25\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z1_g8_tower_desktop_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"02.07.00\",\"matchCriteriaId\":\"7C872354-7197-465A-B691-3BD20A229CA8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z1_g8_tower_desktop_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2A41ADB-202C-46AD-AFBA-6F060FA3502F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4_g4_workstation_\\\\(core-x\\\\)_firmware:*:*:*:*:*:linux_kernel:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"DC137328-5573-4781-8DA2-B135CD44533A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4_g4_workstation_\\\\(core-x\\\\)_firmware:*:*:*:*:*:windows_10:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"6E2C4D23-D2FA-4C89-B4C2-C775A17A21C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4_g4_workstation_\\\\(core-x\\\\)_firmware:*:*:*:*:*:windows_7:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"ADA3082C-BC33-4464-8FC3-F45A859A2DB8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4_g4_workstation_\\\\(core-x\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEAD0B9A-B36F-4C48-AFBB-D71192899993\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4_g4_workstation_\\\\(xeon_w\\\\)_firmware:*:*:*:*:*:linux_kernel:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"D9B59BE0-2D53-4D59-846B-80F47B7B836E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4_g4_workstation_\\\\(xeon_w\\\\)_firmware:*:*:*:*:*:windows_10:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"88774B45-D51B-4971-9FD0-AA15523F3788\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z4_g4_workstation_\\\\(xeon_w\\\\)_firmware:*:*:*:*:*:windows_7:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"FF6DFFBF-C17E-4FF7-B4A9-693D42A1C42B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z4_g4_workstation_\\\\(xeon_w\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69EBF60B-E2A4-492B-A58F-2A01B77AE74A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:linux_kernel:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"83CC465C-DFFD-4C9C-881C-97B59410EC36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:windows_10:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"790D9AFB-2AFC-4635-A556-3C91403FE6BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:windows_7:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"77E66B91-184D-49B5-9685-96995F2B1C07\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z6_g4_workstation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DD26B60-086E-4C83-B3EB-CA4981AAAF7C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:linux_kernel:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"EA52B0BD-5AF3-4079-B25B-993CA85CB115\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:windows_10:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"6D033ECD-5E03-4A57-AA34-BA92A6525865\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:windows_7:*:*\",\"versionEndExcluding\":\"02.75\",\"matchCriteriaId\":\"BAFCE15A-5D6A-4AB1-AC68-4AB1E0E55EFF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:z8_g4_workstation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"068354B9-5842-4014-A466-011FA1AA62B5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:engage_flex_mini_retail_system_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"02.10.00\",\"matchCriteriaId\":\"CB0213EB-A71F-4CB0-8D14-4A0C7008B59C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:engage_flex_mini_retail_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8187C850-4BB8-474A-B5D2-09560AAF47D7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:mp9_g4_retail_system_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"02.18.00\",\"matchCriteriaId\":\"B0C3ABB0-30EE-402A-A655-EF1AB8CFDEE4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:mp9_g4_retail_system:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B81932E-C047-45A8-80DD-32E19351D675\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elite_dragonfly_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"D4FCCC71-FA95-43DD-9874-FC873252B614\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elite_dragonfly:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"119A1751-0FD4-4FA7-8681-CC82C4D47BFD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elite_dragonfly_g2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"83CE6347-D6CF-421E-A8B4-D087E4C242F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elite_dragonfly_g2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28829816-379A-43CA-B2B0-2DDC32C9EFA7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elite_dragonfly_max_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"3AC42EBC-B581-4102-B614-C8DDB37A5ED8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elite_dragonfly_max:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"301EE3DA-31B5-44E3-B6B7-1E3A87B24F65\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elite_x2_1013_g3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"A5199F27-D189-4663-AC00-7C63A4BD9900\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elite_x2_1013_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E086097A-D53C-4AD2-891E-FEF5EE21B6AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elite_x2_g4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"DD025A26-8ED9-4A81-AE2D-DFEDBAE336D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elite_x2_g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72682A82-B694-4CE0-9B88-DCAAC8A6C8B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elite_x2_g8_tablet_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"7FC3266B-99F0-4F25-B923-154522B8833B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elite_x2_g8_tablet:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C181FFEA-FF8C-4FFF-AB13-6F660FD54737\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_1050_g1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"7D6965EE-5FA5-4DD5-B1B7-339181E90A00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_1050_g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F4E2D01-4CC3-4FBB-8B49-0C087DC580FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_830_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"E8AD6BBB-F010-4A24-A958-FD91303C46FE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_830_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E8BCBD1-AB54-4160-9FEC-426B3905A56A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_830_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"4582CD80-9128-41C3-8F11-268B3C484E97\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_830_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A8707F9-46CB-48F7-8CFA-EE90F44D5585\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_830_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"7036932C-2519-4415-B770-65F9E87B4C8D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_830_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"127371E2-74C1-41E8-8D0C-8551E4B6A656\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_830_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"BA6A472F-0B69-46EC-A8B7-E6D35BB54EA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_830_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D306687B-3EF9-40B4-88E1-F9840FBF332C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_836_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"31B20FC9-4E17-49A9-9ADB-51023CA8DE4C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_836_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A30065E2-A918-499B-864F-50C12E7699EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_836_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"F815D088-2416-4DDB-BE7A-8DEF2C79266B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_836_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"663E72B3-5986-434C-B395-43CF1A461A55\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_840_aero_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"A01005B3-2613-4991-9D13-186E5EE129AD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_840_aero_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5446ABE-8540-4DF0-A3EA-BEE74199856C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_840_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"A0890E78-D869-45C4-8FE9-023B7392230B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_840_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36FA123E-719F-465F-A89C-D15E79360A96\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_840_g5_healthcare_edition_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"E5EB5590-0502-4DD2-82EE-B0E996BA7853\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_840_g5_healthcare_edition:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"370DA2D2-F41F-4569-A58D-A38C6B9AC01B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_840_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"A8449A10-2386-4BC9-B6A7-4D7B724D5E5F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_840_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5091726-485B-4F0D-A451-8FA3FF10B952\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_840_g6_healthcare_edition_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"0B353663-91A0-49C5-BF31-F066635D77AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_840_g6_healthcare_edition:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02654E2D-30A7-4A07-AD0A-10402AD2CD7D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_840_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"1CC73DD1-8996-4A07-BB7F-3CAD5B8DF839\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_840_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A024B6E-6F91-47AB-B29D-659A7F2A0595\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_840_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"24DE0204-652E-4E87-A605-68C2EDFAAFBE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_840_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A27335B7-81BA-4A1D-922B-CE34EBD31A60\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_840r_g4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"71359566-0D9E-4558-BCC6-AAB4A37CF793\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_840r_g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFF12568-610A-40BA-A29D-946298512F74\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_846_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"650BE1D6-4959-4B52-B764-48A480E88F4B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_846_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74BBE35C-34BF-49B0-9501-7A6ABE8799E3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_850_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"D663A797-6C56-497F-BF1C-506D22F05F00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_850_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC2EB22C-6899-4C3B-BA7D-882351D6FC2E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_850_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"0BBD65A6-642F-47F1-B6B2-9EE97A9DEC2C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_850_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC02312C-289C-445B-8FC6-D5854EA44F87\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_850_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"DBBAD7A6-FF7C-4667-B9F2-1E8A9BF14590\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_850_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6F752EC-E05D-416D-99D3-7DEFDA160755\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_850_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"C66FCA12-6232-45AF-8545-6308EE5DA86F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_850_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCEF5B4C-DB2B-4406-8EE1-7E5A63E89045\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_1030_g3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"586AC3DA-3CF3-4746-80B6-13459109A4DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_1030_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79A72152-CDBC-4709-B484-9259E9EAB82D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_1030_g4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"3FFAF331-B433-4672-AF2F-4CEFC9CE1251\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_1030_g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"201BF348-CDDE-4ED8-9339-0830AEE5B208\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_1030_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"B652E6FF-4AF9-4CD2-BA26-D71DE4FC4721\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_1030_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56DFE16C-A6BC-485F-A77F-A892889BBB64\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_1030_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"40E842B2-E3FB-43DA-9BD3-18D77258C6BC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_1030_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0C27ABA-63FC-4DCE-925A-1C8A3D5D73F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_1040_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"A6721D77-E09B-4F2F-BA6F-CB3265010486\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_1040_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B86EC79-4160-4118-8D0B-4CBA069976E5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_1040_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"F0CD1A70-9F2E-4B9D-A2C7-B280C0B9642A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_1040_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"485F527D-CED9-4865-BF19-0E474ED5C177\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_1040_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"91A0AF80-8759-41C5-B0F2-370B96647271\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_1040_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E98FB1B-AC60-4432-B67A-926DF0F7AFD4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_1040_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"A0EC0782-B8AF-4B2B-B8F5-BBBA95CEB010\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_1040_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F3FE302-C270-4C5E-B8AF-A140843E7E3C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_830_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"43CD2A63-737A-4D74-BFE7-4FDDD21968E9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_830_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17C439DA-9B30-47B3-843C-B3A220A5159D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_830_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"BD3E5AE3-EF42-420C-A29F-9F5F06B7B974\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_830_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"707ACE08-2017-4A78-837F-BEBC02929E99\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_830_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"00A1EFA0-07AB-430D-B9ED-7F6F84EDDE67\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_830_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDDE2542-2C2F-4295-91A1-F09E308C5B5F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitebook_x360_830_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"CDE0DC18-44CA-4191-A787-555C773DAFAA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitebook_x360_830_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87B40BA1-1F6C-4786-9F33-52EEF0ADE083\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_430_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"7BD781FA-CF82-49DF-AD6A-C54B5659259F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_430_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FE8B02E-2DBD-4E4D-9B8B-E6E916709327\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_430_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"7B5C798F-9C96-4C99-9F70-026F3B3657B5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_430_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14F18988-4CB2-43D3-ACC5-882695D713D8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_430_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"7E1D6CC1-C0CD-472F-8C9E-00F27B4C8B5F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_430_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99C64369-5FDB-4584-AAB6-C87B95DA5FB1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_430_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.02\",\"matchCriteriaId\":\"54AB35E4-8827-4848-853D-B392C7C88F27\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_430_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"986AAA40-9DC9-4D20-A4DA-2D02636C1A62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_440_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"5FD1C410-2224-4272-B178-562E5AE9A94B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_440_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AD00A6D-426F-4470-A07C-A9E319A813B8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_440_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"F243AEAD-C4FD-4F39-8D55-CE26F364BF3A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_440_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C45C4B7-1E60-40C3-AE9B-1928CFDD15BA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_440_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"F188BF61-13A7-4994-ABAC-3BA8DF74FD0E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_440_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F28CBAEA-21E2-4FB5-A3DF-B20145F63322\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_440_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.02\",\"matchCriteriaId\":\"467B4707-142A-4A2A-851E-06D1C46791ED\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F93D1E8-C7A7-4B35-9389-AAC3DD0FA978\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_450_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"9D190CAC-76EA-4436-8254-9DED818C4512\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_450_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7910C11F-B709-45DC-B4EB-92B7A2001E13\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_450_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"3C7D1DD2-CFBB-4E3E-8B48-214B014A13F0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_450_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B92A898F-BBDC-48B8-9159-8E0CD67AD6ED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_450_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"FE3751D6-2B81-41FF-A8E7-D4BD7AD4B87D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_450_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7A4B95B-48FA-493B-986C-F4E0C5E20183\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_450_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.02\",\"matchCriteriaId\":\"6BA2A031-1AEB-4B3A-A173-BACF3EBFFA09\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_450_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1982269-50DD-4939-8158-4B7357D7AEE4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_470_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"6E5E3301-3D69-4380-B96F-1F3E0FC5C375\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_470_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D9871C2-D63F-4623-B8E0-1356A48554FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_630_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.01\",\"matchCriteriaId\":\"5A52563B-DFAD-4F28-A939-1A2AE28983AA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_630_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80EF159A-302D-4F73-8A08-683805B051A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_640_g4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"3DC2695D-8CDE-4208-8A16-E8F7F5151A9C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_640_g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E458FE6-3295-4982-BCCD-8BF1BDBCA8B7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_640_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"126B6E1B-5CBD-4B22-9885-C86B9C3D5737\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_640_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"657F2CA6-D464-466F-BB6F-11316D3E27DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_640_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"04DBCD9D-54E4-47C3-8155-7367D9E43BFB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_640_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D01A2D5C-89B8-4609-909C-245DF7A15912\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_640_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.01\",\"matchCriteriaId\":\"2F7BE714-F56C-4EEE-9FC0-543FF17AF860\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_640_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6351F53-2458-47FB-B547-C56691B7CF50\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_650_g4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"FD13471F-E05D-4ECB-BCA4-AA34B495B1AC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_650_g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"389760F8-5B6B-40DD-9F8D-A542CABBD4FC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_650_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"8AFD1502-C6CE-4971-8ADB-5A4DC2F8B4B8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_650_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8F15254-6AF1-4495-B89F-F58084D11D36\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_650_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"49971E3F-92A1-4A9F-91FF-91DEBF6E8BB0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_650_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3AE72B1-6CEF-4F42-8196-8B260F3ED219\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_650_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.01\",\"matchCriteriaId\":\"738DA3C3-B7C4-4537-99B5-F4A2EDB478AA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_650_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED793F1B-C4A0-41B7-856B-20CF33308750\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_x360_11_g3_education_edition_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.18.00\",\"matchCriteriaId\":\"769A944E-5259-4B7C-AC91-76497981621E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_x360_11_g3_education_edition:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DC67078-7715-4A45-A1B4-89D2B7196AE4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_x360_11_g4_education_edition_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.13.00\",\"matchCriteriaId\":\"1B911F5A-1032-4AD2-AB5F-19DC2BAD892A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_x360_11_g4_education_edition:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE118D9C-6CCF-4063-891C-A87E5CEAA181\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_x360_11_g5_education_edition_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.09.00\",\"matchCriteriaId\":\"28FFF7D0-03C4-4B20-9666-A58B8A1CF6C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_x360_11_g5_education_edition:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"151C6B17-477C-44F7-8701-DA9E35981379\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_x360_11_g6_education_edition_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.09.00\",\"matchCriteriaId\":\"81BF086A-9043-4279-B0BB-C28E5266CF8B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_x360_11_g6_education_edition:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3688601-B128-4BEA-980D-DC3325343662\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_x360_11_g7_education_edition_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"479DA25B-CBBA-4735-8366-19C97F2E1114\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_x360_11_g7_education_edition:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48A3E458-BE55-437B-9303-CCAE23C40ACE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:probook_x360_440_g1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"31412E71-045E-4B40-8F28-CDC0873104A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:probook_x360_440_g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7532BAA7-ABDC-4283-91AC-56A30994F0BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_14u_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"4BFA7B22-C27D-4948-B262-711961B578CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_14u_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DF860CD-924C-4A15-AD82-FDBCF7C13F43\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_14u_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"FF4C9066-374E-4E80-B869-C1434780D6F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_14u_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"740E81D7-398A-4DDE-92A7-B89BABCEB4FE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_15_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"135441B1-A6F3-40F1-A130-91F1EC8FA1DD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_15_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03B95D51-A675-4995-9F43-0C53CC7C9035\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_15_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"8728F160-4B47-42BB-9346-0683B67AD29A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_15_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECC561D0-0216-4517-A551-166557FC5D1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_15u_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"FD4767AF-B638-4DCF-91FB-D13DA49BCB37\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_15u_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D2F25C8-CCFC-47BA-B7F9-A86478245203\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_15u_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"19DCA0C1-E526-4DF3-8599-B59219589FF0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_15u_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F2EFA3E-8FDC-435B-AED8-4146826934E0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_17_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"ED250C9F-E60F-4E78-81F2-7EACCD5FB58C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_17_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17DC385C-6789-4F1C-9280-9E5C7DE8EA11\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_17_g6_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"A2385933-DF9C-47A8-8565-D8EAF3549FA5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_17_g6:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27439B52-B175-4D6F-8AE0-2D8648789D4B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_create_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"04A693EA-9603-4D91-AA9F-BE4A3AC86B38\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_create_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F61956A9-8CFB-4B96-B068-878E0CFF13BF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_firefly_14_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"020F41F8-69D4-4118-8CA0-E3752FFC60E0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_firefly_14_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8669346-38FA-44C5-A712-2C0FCCFDD44E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_firefly_14_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"726C41E6-F299-4026-BADD-BC37D026E0D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_firefly_14_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"381B4451-AB62-444A-B34A-108EF21D84D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_firefly_15_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"3F364173-9EDE-4C39-BABB-9F3538035B53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_firefly_15_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A07A7FB8-9EB1-46DE-9AD7-07D4DC2A7E06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_firefly_15_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"640C9068-7E29-4BC2-9C59-DBD405A7A368\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_firefly_15_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7ADBEE86-6EB5-4892-BAFE-AD37FFD13849\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_fury_15_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"D964C206-5B2B-45F3-BAD2-489572A792F4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_fury_15_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC03BC1C-7FC2-4EC7-A806-8717413B1AED\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_fury_15_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.01\",\"matchCriteriaId\":\"C77CD9B3-A3D1-4FA6-9E40-C14A6F79AB82\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_fury_15_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"168E3BC4-9ED6-4863-B6E8-458EEF9E7339\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_fury_17_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"15F9EE0F-A8A6-4888-98F5-4AF74425AD31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_fury_17_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7ECCEB4-60B6-454D-96F1-1CAAEA7CD223\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_fury_17_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.01\",\"matchCriteriaId\":\"7A0E656A-7904-4A2A-987D-53B9FD38D2E6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_fury_17_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64BAA40E-D254-463B-976F-A75898E20E67\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_power_15_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"4840180D-E1E1-4550-985E-42AC49384E82\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_power_15_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2312856-3674-475E-8450-4D10D9A5A9DC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_power_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"94DDD00B-487D-4839-BEB5-8748AD772C51\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_power_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC5BA7CE-6BF2-408F-8B50-07B897342E52\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_studio_15_g8_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"9B376E11-11D9-46D6-ABA0-FF1EA0645DEB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_studio_15_g8:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24FB7C62-AD79-4F7A-8AA4-27B744B5F26C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_studio_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"DB6FD126-4865-4855-9A4E-BD08FFFA66C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_studio_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9D3558A-C998-40B9-9E52-5F581B74A3F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_studio_g7_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.00\",\"matchCriteriaId\":\"271CCD58-E2D1-48B4-9871-1C6A5F1B25AF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_studio_g7:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9E44F4E-85E6-471A-A85D-4D7B09B69F0C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zbook_studio_x360_g5_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"B0202EB4-0693-43ED-B1C6-7B028701A957\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zbook_studio_x360_g5:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DA80A29-3C98-4767-B784-F2A13097741E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_66_pro_13_g2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"3C4B45DC-DA76-48A6-8D98-D522128EE7FB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_66_pro_13_g2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AB9C53B-328F-449C-9137-D20B72031D8D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_66_pro_14_g2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"1224114D-B82D-4A80-91CC-4CC6C29A00C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_66_pro_14_g2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFA26D63-E18E-4AB8-950D-904CF3D62EB5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_66_pro_14_g3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"85E87ADF-4724-46E0-B67B-0C54649BC659\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_66_pro_14_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DA9E826-6EAA-45EE-8613-46EE025ECD65\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_66_pro_14_g4_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.08.02\",\"matchCriteriaId\":\"D89DF58D-EE3A-41EA-848F-468E07780FF1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_66_pro_14_g4:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9B9E550-4D16-430D-813E-B425BAFEA4C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_66_pro_15_g2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"29A11166-864C-42FE-AADA-8B04C274D921\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_66_pro_15_g2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36603B4C-F5C6-4075-BEB1-90401B5D3A2D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_66_pro_15_g3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"27D066B2-7A97-4948-AC59-430B87E18E92\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_66_pro_15_g3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69B4D838-F2FC-4F7B-B606-9F005D125FA1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_66_pro_g1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.19.00\",\"matchCriteriaId\":\"61429F91-58E2-48EE-9E50-F3B9D1AE2915\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_66_pro_g1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3654A9CC-CBF9-4045-A929-1458A2AE99FA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_x_13_g2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"01.12.00\",\"matchCriteriaId\":\"FADB9E91-4397-40C8-BF24-4BB0683EC8F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_x_13_g2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C5FBB0A-9A79-482F-9E59-2291712BD161\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:260_g3_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.17.00\",\"matchCriteriaId\":\"548B6DE2-E251-4D58-81AD-884F4576AE55\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:260_g3_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7565B63-6B13-4F72-9538-845635B945DF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_35w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"386FBD67-6C2C-4C60-93E6-0A308E5DDF3F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_35w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D22A07E-3033-4B61-B366-E09FE72DF08B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_65w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"5FA20789-20F8-468C-BA4E-8F6C25A7D5C7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_65w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFB6F5B7-5248-45C8-B83E-5ADD8077E9D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_95w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"C8675000-C780-4AAC-B110-A62B45878D73\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_95w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3D567DE-9D36-4B40-8847-AAD14E253CAB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g4_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"E1453A48-B267-4B3C-A0C2-5A39468613DB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g4_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7A503FF-6FAB-4B98-A01C-EEE0880EBCB1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g4_tower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"DDBB384C-D46F-4018-A5FD-B4E3E7495A02\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g4_tower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D53396C-8599-4D9E-9147-2C47945AF38C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g4_tower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"DDBB384C-D46F-4018-A5FD-B4E3E7495A02\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g4_tower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D53396C-8599-4D9E-9147-2C47945AF38C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g4_workstation_edition_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"21AE541E-EC44-4A11-B5C1-3735C9EB92E4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g4_workstation_edition:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DE7353B-4944-4703-B17D-FF73328D6B9F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"A5252DEB-5D25-420C-956C-0613C6956C04\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g5_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03790B11-60F3-4467-9159-2C5395235239\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"F4215483-D174-4000-9692-AA4576FBB13A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g5_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F8E6C68-1086-4EA8-B8D0-E9EE9B9270F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g5_tower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"7C13165A-DA77-4CAC-B9A6-81559E771AAF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g5_tower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BA51C81-1D34-4747-A262-B28566BB097E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"01AF91A0-282E-4E3E-96CB-1866CC6F9298\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g6_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82BF1386-C43B-4B27-BF7C-26D0FAF13B1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"1F2F3943-84C1-4C4E-9E90-95BF31C3C561\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g6_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C2BEB8B-BA79-4B40-8A35-6CD2545E1595\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g6_tower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"AEE243D0-FF62-4409-8EBB-F36B03E39B85\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g6_tower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44A8DAD6-9F6D-4AC6-976C-3D4EC566A1CE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.07.00\",\"matchCriteriaId\":\"EE96B118-36B1-47F0-BD79-7442105C6F87\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g8_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5993123E-068C-498A-B17F-8D9A45BA4510\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.07.00\",\"matchCriteriaId\":\"7657C542-ED48-4A86-B9D1-56D1C69EF3C8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g8_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CE2056B-7AFB-40C7-B16D-891EFFD9C29C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_800_g8_tower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.07.00\",\"matchCriteriaId\":\"B6A91A8D-F8E6-4575-983D-E7DA65070B18\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_800_g8_tower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E0679C9-65D0-48D6-A7B2-60B3411AEF84\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_805_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.07.00\",\"matchCriteriaId\":\"2E3556A6-20CA-4FF7-B79F-B7042B723A45\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_805_g6_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E433E3CE-8920-4FE2-8C9E-06E02D5EF5B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_805_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.07.00\",\"matchCriteriaId\":\"A708017F-2D47-4BC3-B558-BE53FE45BF3C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_805_g6_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"614C6061-751F-4F8D-BDB0-225B0AD9779A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_805_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.03.00\",\"matchCriteriaId\":\"35027039-EEC5-453C-B5CA-0E008B8B986C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_805_g8_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07D9459-D011-4C13-A406-5DA58AD88080\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_805_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.03.00\",\"matchCriteriaId\":\"73BB2DA7-7D09-4685-B5AC-6E9315E42A65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_805_g8_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03B881AC-BAA0-495C-B336-050C25A2420B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_880_g4_tower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"3945E498-B34F-491A-B67D-496AC7D24CC6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_880_g4_tower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69BF32D7-1115-4971-BE35-2254A6C566F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_880_g5_tower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"D0AFEC77-9B32-4353-B81A-0EED73CA0467\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_880_g5_tower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BB467DC-D239-4459-BF9C-041D8EB8F51B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_880_g6_tower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"EF60D396-C1B8-41EB-9560-3BBB9655B33D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_880_g6_tower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA5CE713-B07E-49C8-88CB-B16FA4752B16\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:elitedesk_880_g8_tower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.07.00\",\"matchCriteriaId\":\"D244F930-2B60-4769-8CD4-9C042038ED7D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:elitedesk_880_g8_tower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C276DE51-141A-49D0-9BE4-9F740D5A2F44\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"DC8D3CEB-F5AF-4FB2-8E7B-61C1BF11D703\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D93B88FF-5E57-4DD9-9568-26306D068230\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"4823EE58-C174-4C60-B0D9-96B682E79EB3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AEF73CA-7A05-4650-9081-0A501D09F551\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"841E0FD7-2512-46F2-8DB0-10747FC421B9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"449CD858-582B-49CA-95CB-AFDD5302ACE2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"324459DB-65E9-45EA-9333-95F956CA25BA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E4CB0D3-2948-4D9B-8C48-CE6E9A8A2FAA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"232C50AA-162B-4D0D-B2D9-2E4BD99AEE72\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79906731-74C1-4081-822F-29D0095F038A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"F87CD4E9-0981-49E2-BD14-C71BFC01C121\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6457F0D4-E6C7-414A-AAAD-0F61FFE8BA72\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"C2BAAFD8-523E-449C-99FE-3E04D27C9DAB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4192B127-7DDA-47BA-A441-013061097ED9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"5948DFE1-A3DB-4747-AEC9-1256CAE386AA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C30F26F-C63A-4C95-AFAB-7B49B29C667C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"7C192881-CA4D-476A-AB86-6455CAFC797D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66ED0BFA-33B9-4850-A934-DCE0399BBC67\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g5_23.8-in_healthcare_edition_all-in-one_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"20AE11EE-CD36-47A4-8245-8AA8DE777EFB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g5_23.8-in_healthcare_edition_all-in-one:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E633AD8-5971-4E37-86BD-83B309D1776E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g5_23.8-inch_all-in-one_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"35F011A8-0688-436A-89B2-E85C149B3549\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g5_23.8-inch_all-in-one:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFC825D4-65D1-40BE-AAFB-9A1D117DE069\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"B1BDA03D-946E-4C24-B699-C1EE5F9B667C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DE92A90-5580-4BF6-B73F-ECEA4693048D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g6_27_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"BEAAB0F3-49B9-4AA8-8D9B-69B2246E3B23\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g6_27_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"888AC622-8FB4-4D17-846F-1F9CCBB7EBFC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g8_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.07.00\",\"matchCriteriaId\":\"474023E5-9A9D-46A1-B414-A73002CFA76F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g8_24_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24380823-8372-4989-8EB9-46390A258B7E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:eliteone_800_g8_27_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.07.00\",\"matchCriteriaId\":\"4FCD473F-0C75-4D81-B086-7AADEADBFCDE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:eliteone_800_g8_27_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"919973B8-DA48-410A-B3D4-43A56E7BE381\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_400_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"818F199A-8694-42CE-9EA4-FEC1350EB9AB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_400_g4_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7970A0E9-64DC-4CA0-A9CA-D06B2BBC42AF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_400_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"D8C5156B-E69D-4835-8E16-7BAB67AD89DC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_400_g5_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E95BF30A-1785-4DE1-8272-29196C362C06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_400_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"6DECC12A-E49B-44D8-A04D-F00EC4C2AB7F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_400_g5_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B2CA843-228C-42FE-8236-1C99B30862E1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_400_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"C5B16CEC-8139-4E89-94EA-D5E297CEA431\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_400_g5_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D168C72-E7A0-490C-A09C-A075F0C2BFB9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_400_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"739D9744-B075-40D0-AE69-90A5F6C5CA13\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_400_g6_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DDBB3E4-A059-4DE9-B887-EAD8D0E34627\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_400_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"6FA0D65A-39F2-4205-A97E-5EED1A18B643\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_400_g6_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5627AA12-2392-40E8-8A60-2B7FCA939DD5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_400_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"2C93C14D-E95D-44B9-B13A-E622D7E11848\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_400_g6_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A41C8C9E-FCCA-4943-B4AF-7E252175619F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_400_g7_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"9E3C53A9-F529-4B69-B83A-9B69160C4888\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_400_g7_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87157F17-55C7-4B67-A569-553DED315A2B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_400_g7_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"CABF07C3-5398-4632-9637-A36FCD1040C4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_400_g7_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF55615F-4964-4A6A-91E4-1DF00ABA9F98\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_405_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.03.00\",\"matchCriteriaId\":\"D828606A-FE16-4E48-A29E-3FB90BECEA27\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_405_g8_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6089CFE4-9A55-484A-92DD-06ADA6C44792\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_405_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.03.00\",\"matchCriteriaId\":\"A8AC88BE-779A-45CD-95FF-1CE541158112\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_405_g8_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFAC2E25-2018-45F3-AF42-CE770A88384B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_480_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"232C554F-C097-4382-80B2-E2D833529142\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_480_g5_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97D3F8A6-877D-4819-A101-B85498D4AB2E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_480_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"6B69F84E-FFC4-4CE3-8710-6D75919A2BFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_480_g6_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E56B264-71E2-4498-AB2D-F4EF3D1BD146\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_480_g7_pci_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"8CFCEF0C-BFA2-48FF-AE4A-43181D71444C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_480_g7_pci_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"170C9213-D9D3-4528-8FA7-B4731A74CC36\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"3FF3CF3A-622E-4C32-AF6F-9D6C89F1B662\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g4_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDBB1855-A92B-4514-B0DE-CBD6D425866A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g4_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"788D9187-602F-492F-89D1-BA1C15ED8CDC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g4_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50DCF6A1-3209-4743-B1A5-774FE0BF25C9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g4_microtower_pc\\\\(with_pci_slot\\\\)_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"71ED3A81-58FF-4457-B995-42FF769F44B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g4_microtower_pc\\\\(with_pci_slot\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF4AD5C3-C195-43C0-A3BA-890DD752D31D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g4_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"A2ECE739-98D4-4C76-A212-80DF4E81B0C5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g4_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A342E698-B741-4A24-A797-0940C007770F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"F7A380E5-6EC1-426D-ABBD-2E5C0556777B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g5_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"168198E7-A2E4-4701-9088-1812C481EC44\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"BABD24F3-71E3-4B49-82CA-C9961C423C33\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g5_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"886E5433-52EE-4640-BC7D-52B96F1462EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g5_microtower_pc\\\\(with_pci_slot\\\\)_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"AC2B81EB-3D9B-4F12-8B09-D33C029CDDD2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g5_microtower_pc\\\\(with_pci_slot\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A15C647C-9BFF-46AD-86D4-EC298251082E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"43096AA3-F1F0-4DA3-93CD-4C71727E00CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g5_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5443815D-8487-423B-90C1-CE2BD0FCA5E8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"50165F13-7A1C-4447-A3DB-04B1E95FB002\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g6_desktop_mini_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC90581B-B895-42A7-993C-1EF1F6B6F3B0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"0AD72972-49A9-409E-9109-5CB0F03F0C0C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g6_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"907BAC5B-0AC3-42CD-B145-754639D19E1C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_600_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"1FC526D5-5D25-4C0C-935B-2282B3C162E1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_600_g6_small_form_factor_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E88C11F-4494-4E85-9ABC-9EC2A6000D4F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_680_g4_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"8D7C1521-68B1-4602-AB5E-A3BB4C8356F1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_680_g4_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"565542BE-1CF9-49B9-AAA3-36ACC2A4542A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_680_g4_microtower_pc\\\\(with_pci_slot\\\\)_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"A2623895-0CD2-475A-B320-B603CF727E5F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_680_g4_microtower_pc\\\\(with_pci_slot\\\\):-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DB4EEC5-121D-4F96-96AF-88B83CD81D70\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:prodesk_680_g6_pci_microtower_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"07392785-E50B-4CA6-B835-0FB15D0006A3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:prodesk_680_g6_pci_microtower_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11DB0F11-8DCE-4107-9F44-84719BCA0813\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"C1131C8E-63D8-49E8-BDBE-27AF01FCC23B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45AB7CC1-0758-4734-9B6A-7F8CF6107F6D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"DCA47E40-DF50-44E6-A262-6C73497CCE25\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68F00E1A-4DE9-4279-8C8B-3B6950B94354\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_400_g5_20-inch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"477C1943-D5CC-4780-9EBA-641DB2B441A0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_400_g5_20-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84E759D0-5DD6-4FD2-A19B-AEC9EF794B49\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_400_g5_23.8-inch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"39D34B53-DBEB-4CF6-8B00-AFDA9A64B0EC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_400_g5_23.8-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"941BB9E1-9900-4258-A05F-31844B581A5E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_400_g6_20_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"6B11A0FB-F222-40E9-A70D-07E969B643A3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_400_g6_20_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9133486D-201B-4655-85E7-983B22408635\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_400_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"4C1353CD-E387-49CB-817D-FBBDC08DA499\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_400_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B82E6B60-301C-4290-88ED-6A2A28CA1CD6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"53F529E6-0D01-4351-ACB8-77C0EF338F90\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BEBA6E6-15F0-48B8-B7D8-12FE12FECFDB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_440_g5_23.8-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"53785B1C-A705-4D8F-BC2C-7F16C6E12303\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_440_g5_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9FEAE60-B7F7-4866-A8B4-4C750EFEE8A0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_440_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"2770447B-C933-4384-9E62-2533EFECC33B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_440_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A01F60F-D076-4598-8119-679C9DE32E39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.18.00\",\"matchCriteriaId\":\"FA937A69-FF57-475A-8652-36D25E1E234D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB542C59-F3B5-42B8-892C-8FCAAEFF81E2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_600_g5_21.5-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.12.00\",\"matchCriteriaId\":\"70DC685B-8778-4D10-BE55-178A179299EC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_600_g5_21.5-in_all-in-one_business_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D55C0EC8-3FAD-45FA-9729-2C04BC14794A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:proone_600_g6_22_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"6981E279-E529-432F-9BD6-E132571FC685\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:proone_600_g6_22_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"800F6A3F-3190-4386-B3DD-D2B3F4F0E995\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_66_pro_g3_22_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"8ACF8FA2-2D5C-458D-8C31-FFFF98226677\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_66_pro_g3_22_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E0E53DC-2F0E-49C4-98BE-1657B65D5F2C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:zhan_66_pro_g3_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.10.00\",\"matchCriteriaId\":\"0B952BD6-48F0-4890-8897-1738526A9792\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hp:zhan_66_pro_g3_24_all-in-one_pc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88559CE1-5B30-42AE-B136-89C11A0D36C6\"}]}]}],\"references\":[{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027\",\"source\":\"psirt@amd.com\"},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032\",\"source\":\"psirt@amd.com\"},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-jxf5-m5fg-rw27
Vulnerability from github
Published
2022-02-17 00:00
Modified
2022-05-13 00:00
Severity ?
Details
Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.
{ "affected": [], "aliases": [ "CVE-2021-39298" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-02-16T17:15:00Z", "severity": "HIGH" }, "details": "Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.", "id": "GHSA-jxf5-m5fg-rw27", "modified": "2022-05-13T00:00:39Z", "published": "2022-02-17T00:00:32Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-39298" }, { "type": "WEB", "url": "https://support.hp.com/us-en/document/ish_5661066-5661090-16" }, { "type": "WEB", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "type": "WEB", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
wid-sec-w-2023-0165
Vulnerability from csaf_certbund
Published
2022-02-16 23:00
Modified
2023-01-22 23:00
Summary
HP BIOS UEFI Firmware: Mehrere Schwachstellen ermöglichen Privilegieneskalation
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das BIOS ist die Firmware bei IBM PC kompatiblen Computern.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen im HP BIOS in der UEFI Firmware ausnutzen, um seine Privilegien zu erhöhen.
Betroffene Betriebssysteme
- BIOS/Firmware
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Das BIOS ist die Firmware bei IBM PC kompatiblen Computern.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im HP BIOS in der UEFI Firmware ausnutzen, um seine Privilegien zu erh\u00f6hen.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0165 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0165.json" }, { "category": "self", "summary": "WID-SEC-2023-0165 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0165" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04404" }, { "category": "external", "summary": "HP Customer Support - Knowledge Base vom 2022-02-16", "url": "https://support.hp.com/us-en/document/ish_5661066-5661090-16" } ], "source_lang": "en-US", "title": "HP BIOS UEFI Firmware: Mehrere Schwachstellen erm\u00f6glichen Privilegieneskalation", "tracking": { "current_release_date": "2023-01-22T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:42:03.562+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0165", "initial_release_date": "2022-02-16T23:00:00.000+00:00", "revision_history": [ { "date": "2022-02-16T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-01-22T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von HP aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "HP BIOS UEFI Firmware", "product": { "name": "HP BIOS UEFI Firmware", "product_id": "T022097", "product_identification_helper": { "cpe": "cpe:/h:hp:bios:uefi_firmware" } } } ], "category": "vendor", "name": "HP" }, { "branches": [ { "category": "product_name", "name": "HPE ProLiant", "product": { "name": "HPE ProLiant", "product_id": "T009310", "product_identification_helper": { "cpe": "cpe:/h:hp:proliant:-" } } } ], "category": "vendor", "name": "HPE" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-39297", "notes": [ { "category": "description", "text": "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht n\u00e4her beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T009310", "T022097" ] }, "release_date": "2022-02-16T23:00:00.000+00:00", "title": "CVE-2021-39297" }, { "cve": "CVE-2021-39298", "notes": [ { "category": "description", "text": "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht n\u00e4her beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T009310", "T022097" ] }, "release_date": "2022-02-16T23:00:00.000+00:00", "title": "CVE-2021-39298" }, { "cve": "CVE-2021-39299", "notes": [ { "category": "description", "text": "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht n\u00e4her beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T009310", "T022097" ] }, "release_date": "2022-02-16T23:00:00.000+00:00", "title": "CVE-2021-39299" }, { "cve": "CVE-2021-39300", "notes": [ { "category": "description", "text": "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht n\u00e4her beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T009310", "T022097" ] }, "release_date": "2022-02-16T23:00:00.000+00:00", "title": "CVE-2021-39300" }, { "cve": "CVE-2021-39301", "notes": [ { "category": "description", "text": "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht n\u00e4her beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T009310", "T022097" ] }, "release_date": "2022-02-16T23:00:00.000+00:00", "title": "CVE-2021-39301" } ] }
WID-SEC-W-2023-0165
Vulnerability from csaf_certbund
Published
2022-02-16 23:00
Modified
2023-01-22 23:00
Summary
HP BIOS UEFI Firmware: Mehrere Schwachstellen ermöglichen Privilegieneskalation
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Das BIOS ist die Firmware bei IBM PC kompatiblen Computern.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen im HP BIOS in der UEFI Firmware ausnutzen, um seine Privilegien zu erhöhen.
Betroffene Betriebssysteme
- BIOS/Firmware
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Das BIOS ist die Firmware bei IBM PC kompatiblen Computern.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen im HP BIOS in der UEFI Firmware ausnutzen, um seine Privilegien zu erh\u00f6hen.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0165 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2023-0165.json" }, { "category": "self", "summary": "WID-SEC-2023-0165 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0165" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04404" }, { "category": "external", "summary": "HP Customer Support - Knowledge Base vom 2022-02-16", "url": "https://support.hp.com/us-en/document/ish_5661066-5661090-16" } ], "source_lang": "en-US", "title": "HP BIOS UEFI Firmware: Mehrere Schwachstellen erm\u00f6glichen Privilegieneskalation", "tracking": { "current_release_date": "2023-01-22T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:42:03.562+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0165", "initial_release_date": "2022-02-16T23:00:00.000+00:00", "revision_history": [ { "date": "2022-02-16T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-01-22T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von HP aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "HP BIOS UEFI Firmware", "product": { "name": "HP BIOS UEFI Firmware", "product_id": "T022097", "product_identification_helper": { "cpe": "cpe:/h:hp:bios:uefi_firmware" } } } ], "category": "vendor", "name": "HP" }, { "branches": [ { "category": "product_name", "name": "HPE ProLiant", "product": { "name": "HPE ProLiant", "product_id": "T009310", "product_identification_helper": { "cpe": "cpe:/h:hp:proliant:-" } } } ], "category": "vendor", "name": "HPE" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-39297", "notes": [ { "category": "description", "text": "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht n\u00e4her beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T009310", "T022097" ] }, "release_date": "2022-02-16T23:00:00.000+00:00", "title": "CVE-2021-39297" }, { "cve": "CVE-2021-39298", "notes": [ { "category": "description", "text": "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht n\u00e4her beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T009310", "T022097" ] }, "release_date": "2022-02-16T23:00:00.000+00:00", "title": "CVE-2021-39298" }, { "cve": "CVE-2021-39299", "notes": [ { "category": "description", "text": "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht n\u00e4her beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T009310", "T022097" ] }, "release_date": "2022-02-16T23:00:00.000+00:00", "title": "CVE-2021-39299" }, { "cve": "CVE-2021-39300", "notes": [ { "category": "description", "text": "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht n\u00e4her beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T009310", "T022097" ] }, "release_date": "2022-02-16T23:00:00.000+00:00", "title": "CVE-2021-39300" }, { "cve": "CVE-2021-39301", "notes": [ { "category": "description", "text": "In HP BIOS existieren in der UEFI Firmware mehrere Schwachstellen. Ein lokaler Angreifer kann diese, nicht n\u00e4her beschriebenen Schwachstellen ausnutzen, um seine Rechte zu erweitern." } ], "product_status": { "known_affected": [ "T009310", "T022097" ] }, "release_date": "2022-02-16T23:00:00.000+00:00", "title": "CVE-2021-39301" } ] }
WID-SEC-W-2022-0073
Vulnerability from csaf_certbund
Published
2022-05-10 22:00
Modified
2024-02-13 23:00
Summary
AMD Prozessoren: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Prozessoren sind die zentralen Rechenwerke eines Computers.
Angriff
Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren.
Betroffene Betriebssysteme
- BIOS/Firmware
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Prozessoren sind die zentralen Rechenwerke eines Computers.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0073 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0073.json" }, { "category": "self", "summary": "WID-SEC-2022-0073 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0073" }, { "category": "external", "summary": "AMD Security Advisory vom 2022-05-10", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "category": "external", "summary": "AMD Security Advisory vom 2022-05-10", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" }, { "category": "external", "summary": "Lenovo Security Advisory vom 2022-05-10", "url": "https://support.lenovo.com/us/en/product_security/LEN-87863" }, { "category": "external", "summary": "HP Security Bulletin HPSBHF03792 vom 2022-05-12", "url": "https://support.hp.com/us-en/document/ish_6189684-6189764-16/HPSBHF03792" }, { "category": "external", "summary": "HPE Security Bulletin HPESBHF04235 vom 2022-05-17", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04235en_us\u0026hprpt_id=ALERT_HPE_3023598\u0026jumpid=em_pom8nu6hj_aid-520066529" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-070 vom 2022-05-20", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-070.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1751-1 vom 2022-05-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011100.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1847-1 vom 2022-05-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011162.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1840-1 vom 2022-05-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011156.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1846-1 vom 2022-05-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011160.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1923-1 vom 2022-06-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011226.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2022-1800 vom 2022-06-07", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1800.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1606 vom 2022-07-07", "url": "https://alas.aws.amazon.com/ALAS-2022-1606.html" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04404" }, { "category": "external", "summary": "AMD Security Bulletin", "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5001.html" } ], "source_lang": "en-US", "title": "AMD Prozessoren: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-02-13T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:26:24.486+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-0073", "initial_release_date": "2022-05-10T22:00:00.000+00:00", "revision_history": [ { "date": "2022-05-10T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-05-12T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2022-05-17T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von HPE aufgenommen" }, { "date": "2022-05-19T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Amazon und SUSE aufgenommen" }, { "date": "2022-05-26T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-06-02T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-06-07T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-07-07T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-01-22T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2023-04-02T22:00:00.000+00:00", "number": "10", "summary": "CVE\u0027s erg\u00e4nzt" }, { "date": "2024-02-13T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von AMD aufgenommen" } ], "status": "final", "version": "11" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "Epyc", "product": { "name": "AMD Prozessor Epyc", "product_id": "T020995", "product_identification_helper": { "cpe": "cpe:/h:amd:amd_processor:epyc" } } }, { "category": "product_version", "name": "Ryzen", "product": { "name": "AMD Prozessor Ryzen", "product_id": "T023180", "product_identification_helper": { "cpe": "cpe:/h:amd:amd_processor:ryzen" } } }, { "category": "product_version", "name": "Athlon", "product": { "name": "AMD Prozessor Athlon", "product_id": "T023181", "product_identification_helper": { "cpe": "cpe:/h:amd:amd_processor:athlon" } } }, { "category": "product_name", "name": "AMD Prozessor", "product": { "name": "AMD Prozessor", "product_id": "T029010", "product_identification_helper": { "cpe": "cpe:/h:amd:amd_processor:-" } } } ], "category": "product_name", "name": "Prozessor" } ], "category": "vendor", "name": "AMD" }, { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "HP Computer", "product": { "name": "HP Computer", "product_id": "T023191", "product_identification_helper": { "cpe": "cpe:/h:hp:computer:-" } } } ], "category": "vendor", "name": "HP" }, { "branches": [ { "category": "product_name", "name": "HPE ProLiant", "product": { "name": "HPE ProLiant", "product_id": "T009310", "product_identification_helper": { "cpe": "cpe:/h:hp:proliant:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "category": "product_name", "name": "Lenovo Computer", "product": { "name": "Lenovo Computer", "product_id": "T006520", "product_identification_helper": { "cpe": "cpe:/o:lenovo:lenovo_computer:-" } } } ], "category": "vendor", "name": "Lenovo" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-20559", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2023-20559" }, { "cve": "CVE-2023-20558", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2023-20558" }, { "cve": "CVE-2022-21151", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2022-21151" }, { "cve": "CVE-2022-0005", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2022-0005" }, { "cve": "CVE-2021-39298", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-39298" }, { "cve": "CVE-2021-33124", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-33124" }, { "cve": "CVE-2021-33123", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-33123" }, { "cve": "CVE-2021-33122", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-33122" }, { "cve": "CVE-2021-33117", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-33117" }, { "cve": "CVE-2021-33103", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-33103" }, { "cve": "CVE-2021-26390", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26390" }, { "cve": "CVE-2021-26388", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26388" }, { "cve": "CVE-2021-26386", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26386" }, { "cve": "CVE-2021-26384", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26384" }, { "cve": "CVE-2021-26378", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26378" }, { "cve": "CVE-2021-26376", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26376" }, { "cve": "CVE-2021-26375", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26375" }, { "cve": "CVE-2021-26373", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26373" }, { "cve": "CVE-2021-26372", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26372" }, { "cve": "CVE-2021-26369", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26369" }, { "cve": "CVE-2021-26368", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26368" }, { "cve": "CVE-2021-26366", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26366" }, { "cve": "CVE-2021-26364", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26364" }, { "cve": "CVE-2021-26363", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26363" }, { "cve": "CVE-2021-26362", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26362" }, { "cve": "CVE-2021-26361", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26361" }, { "cve": "CVE-2021-26352", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26352" }, { "cve": "CVE-2021-26351", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26351" }, { "cve": "CVE-2021-26350", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26350" }, { "cve": "CVE-2021-26349", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26349" }, { "cve": "CVE-2021-26348", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26348" }, { "cve": "CVE-2021-26347", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26347" }, { "cve": "CVE-2021-26342", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26342" }, { "cve": "CVE-2021-26339", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26339" }, { "cve": "CVE-2021-26337", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26337" }, { "cve": "CVE-2021-26336", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26336" }, { "cve": "CVE-2021-26335", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26335" }, { "cve": "CVE-2021-26317", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26317" }, { "cve": "CVE-2021-26312", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26312" }, { "cve": "CVE-2021-21136", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-21136" }, { "cve": "CVE-2021-21131", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-21131" }, { "cve": "CVE-2021-0190", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-0190" }, { "cve": "CVE-2021-0189", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-0189" }, { "cve": "CVE-2021-0188", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-0188" }, { "cve": "CVE-2021-0159", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-0159" }, { "cve": "CVE-2021-0155", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-0155" }, { "cve": "CVE-2021-0154", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-0154" }, { "cve": "CVE-2021-0153", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-0153" }, { "cve": "CVE-2020-12951", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2020-12951" }, { "cve": "CVE-2020-12946", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2020-12946" }, { "cve": "CVE-2020-12944", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2020-12944" }, { "cve": "CVE-2020-12931", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2020-12931" } ] }
wid-sec-w-2022-0073
Vulnerability from csaf_certbund
Published
2022-05-10 22:00
Modified
2024-02-13 23:00
Summary
AMD Prozessoren: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Prozessoren sind die zentralen Rechenwerke eines Computers.
Angriff
Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsmaßnahmen zu umgehen und Daten zu manipulieren.
Betroffene Betriebssysteme
- BIOS/Firmware
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Prozessoren sind die zentralen Rechenwerke eines Computers.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-0073 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-0073.json" }, { "category": "self", "summary": "WID-SEC-2022-0073 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-0073" }, { "category": "external", "summary": "AMD Security Advisory vom 2022-05-10", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "category": "external", "summary": "AMD Security Advisory vom 2022-05-10", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" }, { "category": "external", "summary": "Lenovo Security Advisory vom 2022-05-10", "url": "https://support.lenovo.com/us/en/product_security/LEN-87863" }, { "category": "external", "summary": "HP Security Bulletin HPSBHF03792 vom 2022-05-12", "url": "https://support.hp.com/us-en/document/ish_6189684-6189764-16/HPSBHF03792" }, { "category": "external", "summary": "HPE Security Bulletin HPESBHF04235 vom 2022-05-17", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04235en_us\u0026hprpt_id=ALERT_HPE_3023598\u0026jumpid=em_pom8nu6hj_aid-520066529" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-070 vom 2022-05-20", "url": "https://alas.aws.amazon.com/AL2022/ALAS-2022-070.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1751-1 vom 2022-05-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011100.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1847-1 vom 2022-05-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011162.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1840-1 vom 2022-05-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011156.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1846-1 vom 2022-05-25", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-May/011160.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2022:1923-1 vom 2022-06-02", "url": "https://lists.suse.com/pipermail/sle-security-updates/2022-June/011226.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS2-2022-1800 vom 2022-06-07", "url": "https://alas.aws.amazon.com/AL2/ALAS-2022-1800.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2022-1606 vom 2022-07-07", "url": "https://alas.aws.amazon.com/ALAS-2022-1606.html" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04404" }, { "category": "external", "summary": "AMD Security Bulletin", "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-5001.html" } ], "source_lang": "en-US", "title": "AMD Prozessoren: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-02-13T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:26:24.486+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-0073", "initial_release_date": "2022-05-10T22:00:00.000+00:00", "revision_history": [ { "date": "2022-05-10T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-05-12T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2022-05-17T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von HPE aufgenommen" }, { "date": "2022-05-19T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Amazon und SUSE aufgenommen" }, { "date": "2022-05-26T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-06-02T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2022-06-07T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2022-07-07T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2023-01-22T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2023-04-02T22:00:00.000+00:00", "number": "10", "summary": "CVE\u0027s erg\u00e4nzt" }, { "date": "2024-02-13T23:00:00.000+00:00", "number": "11", "summary": "Neue Updates von AMD aufgenommen" } ], "status": "final", "version": "11" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "Epyc", "product": { "name": "AMD Prozessor Epyc", "product_id": "T020995", "product_identification_helper": { "cpe": "cpe:/h:amd:amd_processor:epyc" } } }, { "category": "product_version", "name": "Ryzen", "product": { "name": "AMD Prozessor Ryzen", "product_id": "T023180", "product_identification_helper": { "cpe": "cpe:/h:amd:amd_processor:ryzen" } } }, { "category": "product_version", "name": "Athlon", "product": { "name": "AMD Prozessor Athlon", "product_id": "T023181", "product_identification_helper": { "cpe": "cpe:/h:amd:amd_processor:athlon" } } }, { "category": "product_name", "name": "AMD Prozessor", "product": { "name": "AMD Prozessor", "product_id": "T029010", "product_identification_helper": { "cpe": "cpe:/h:amd:amd_processor:-" } } } ], "category": "product_name", "name": "Prozessor" } ], "category": "vendor", "name": "AMD" }, { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "HP Computer", "product": { "name": "HP Computer", "product_id": "T023191", "product_identification_helper": { "cpe": "cpe:/h:hp:computer:-" } } } ], "category": "vendor", "name": "HP" }, { "branches": [ { "category": "product_name", "name": "HPE ProLiant", "product": { "name": "HPE ProLiant", "product_id": "T009310", "product_identification_helper": { "cpe": "cpe:/h:hp:proliant:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "category": "product_name", "name": "Lenovo Computer", "product": { "name": "Lenovo Computer", "product_id": "T006520", "product_identification_helper": { "cpe": "cpe:/o:lenovo:lenovo_computer:-" } } } ], "category": "vendor", "name": "Lenovo" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-20559", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2023-20559" }, { "cve": "CVE-2023-20558", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2023-20558" }, { "cve": "CVE-2022-21151", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2022-21151" }, { "cve": "CVE-2022-0005", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2022-0005" }, { "cve": "CVE-2021-39298", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-39298" }, { "cve": "CVE-2021-33124", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-33124" }, { "cve": "CVE-2021-33123", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-33123" }, { "cve": "CVE-2021-33122", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-33122" }, { "cve": "CVE-2021-33117", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-33117" }, { "cve": "CVE-2021-33103", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-33103" }, { "cve": "CVE-2021-26390", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26390" }, { "cve": "CVE-2021-26388", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26388" }, { "cve": "CVE-2021-26386", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26386" }, { "cve": "CVE-2021-26384", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26384" }, { "cve": "CVE-2021-26378", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26378" }, { "cve": "CVE-2021-26376", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26376" }, { "cve": "CVE-2021-26375", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26375" }, { "cve": "CVE-2021-26373", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26373" }, { "cve": "CVE-2021-26372", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26372" }, { "cve": "CVE-2021-26369", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26369" }, { "cve": "CVE-2021-26368", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26368" }, { "cve": "CVE-2021-26366", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26366" }, { "cve": "CVE-2021-26364", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26364" }, { "cve": "CVE-2021-26363", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26363" }, { "cve": "CVE-2021-26362", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26362" }, { "cve": "CVE-2021-26361", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26361" }, { "cve": "CVE-2021-26352", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26352" }, { "cve": "CVE-2021-26351", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26351" }, { "cve": "CVE-2021-26350", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26350" }, { "cve": "CVE-2021-26349", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26349" }, { "cve": "CVE-2021-26348", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26348" }, { "cve": "CVE-2021-26347", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26347" }, { "cve": "CVE-2021-26342", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26342" }, { "cve": "CVE-2021-26339", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26339" }, { "cve": "CVE-2021-26337", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26337" }, { "cve": "CVE-2021-26336", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26336" }, { "cve": "CVE-2021-26335", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26335" }, { "cve": "CVE-2021-26317", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26317" }, { "cve": "CVE-2021-26312", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-26312" }, { "cve": "CVE-2021-21136", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-21136" }, { "cve": "CVE-2021-21131", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-21131" }, { "cve": "CVE-2021-0190", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-0190" }, { "cve": "CVE-2021-0189", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-0189" }, { "cve": "CVE-2021-0188", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-0188" }, { "cve": "CVE-2021-0159", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-0159" }, { "cve": "CVE-2021-0155", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-0155" }, { "cve": "CVE-2021-0154", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-0154" }, { "cve": "CVE-2021-0153", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2021-0153" }, { "cve": "CVE-2020-12951", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2020-12951" }, { "cve": "CVE-2020-12946", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2020-12946" }, { "cve": "CVE-2020-12944", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2020-12944" }, { "cve": "CVE-2020-12931", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD-Prozessoren. Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu verursachen, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen und Daten zu manipulieren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert erh\u00f6hte Rechte." } ], "product_status": { "known_affected": [ "T006520", "T020995", "T023180", "T023191", "T023181", "T029010", "T002207", "398363", "T009310" ] }, "release_date": "2022-05-10T22:00:00.000+00:00", "title": "CVE-2020-12931" } ] }
wid-sec-w-2023-0061
Vulnerability from csaf_certbund
Published
2023-01-10 23:00
Modified
2023-05-10 22:00
Summary
AMD Prozessoren: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Prozessoren sind die zentralen Rechenwerke eines Computers.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.
Betroffene Betriebssysteme
- BIOS/Firmware
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Prozessoren sind die zentralen Rechenwerke eines Computers.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0061 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0061.json" }, { "category": "self", "summary": "WID-SEC-2023-0061 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0061" }, { "category": "external", "summary": "Lenovo Security Advisory: LEN-124495", "url": "https://support.lenovo.com/de/de/product_security/ps500559-multi-vendor-bios-security-vulnerabilities-may-2023" }, { "category": "external", "summary": "HP Security Bulletin HPSBHF03846 vom 2023-05-11", "url": "https://support.hp.com/us-en/document/ish_8109529-8109560-16/HPSBHF03846" }, { "category": "external", "summary": "Dell Security Advisory DSA-2023-002", "url": "https://www.dell.com/support/kbdoc/de-de/000207371/dsa-2023-002-dell-poweredge-server-security-update-for-amd-server-vulnerabilities" }, { "category": "external", "summary": "AMD Client Vulnerabilities - January 2023 vom 2023-01-10", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1031" }, { "category": "external", "summary": "AMD Server Vulnerabilities - January 2023 vom 2023-01-10", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1032" }, { "category": "external", "summary": "Lenovo Security Advisory vom 2023-01-10", "url": "https://support.lenovo.com/de/de/product_security/ps500538-amd-server-vulnerabilities-january-2023" }, { "category": "external", "summary": "Lenovo Security Advisory vom 2023-01-10", "url": "https://support.lenovo.com/de/de/product_security/ps500539-amd-client-vulnerabilities-january-2023" }, { "category": "external", "summary": "HP Security Bulletin HPSBHF03831 vom 2023-01-11", "url": "https://support.hp.com/us-en/document/ish_7491443-7491471-16/HPSBHF03831" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04404" } ], "source_lang": "en-US", "title": "AMD Prozessoren: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-05-10T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:41:05.996+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0061", "initial_release_date": "2023-01-10T23:00:00.000+00:00", "revision_history": [ { "date": "2023-01-10T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-01-11T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2023-01-22T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2023-04-02T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2023-05-10T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von HP und LENOVO aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "AMD Prozessor", "product": { "name": "AMD Prozessor", "product_id": "T019554", "product_identification_helper": { "cpe": "cpe:/h:amd:amd_processor:-" } } } ], "category": "vendor", "name": "AMD" }, { "branches": [ { "category": "product_name", "name": "Dell Computer", "product": { "name": "Dell Computer", "product_id": "T006498", "product_identification_helper": { "cpe": "cpe:/o:dell:dell_computer:-" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "HP Computer", "product": { "name": "HP Computer", "product_id": "T023191", "product_identification_helper": { "cpe": "cpe:/h:hp:computer:-" } } } ], "category": "vendor", "name": "HP" }, { "branches": [ { "category": "product_name", "name": "HPE ProLiant", "product": { "name": "HPE ProLiant", "product_id": "T009310", "product_identification_helper": { "cpe": "cpe:/h:hp:proliant:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "category": "product_name", "name": "Lenovo BIOS", "product": { "name": "Lenovo BIOS", "product_id": "T005651", "product_identification_helper": { "cpe": "cpe:/h:lenovo:bios:-" } } }, { "category": "product_name", "name": "Lenovo Computer", "product": { "name": "Lenovo Computer", "product_id": "T006520", "product_identification_helper": { "cpe": "cpe:/o:lenovo:lenovo_computer:-" } } } ], "category": "vendor", "name": "Lenovo" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-26316", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26316" }, { "cve": "CVE-2021-26328", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26328" }, { "cve": "CVE-2021-26343", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26343" }, { "cve": "CVE-2021-26346", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26346" }, { "cve": "CVE-2021-26353", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26353" }, { "cve": "CVE-2021-26355", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26355" }, { "cve": "CVE-2021-26391", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26391" }, { "cve": "CVE-2021-26396", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26396" }, { "cve": "CVE-2021-26398", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26398" }, { "cve": "CVE-2021-26402", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26402" }, { "cve": "CVE-2021-26403", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26403" }, { "cve": "CVE-2021-26404", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26404" }, { "cve": "CVE-2021-26407", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26407" }, { "cve": "CVE-2021-26409", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26409" }, { "cve": "CVE-2021-39298", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-39298" }, { "cve": "CVE-2021-46767", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-46767" }, { "cve": "CVE-2021-46768", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-46768" }, { "cve": "CVE-2021-46779", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-46779" }, { "cve": "CVE-2021-46791", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-46791" }, { "cve": "CVE-2021-46795", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-46795" }, { "cve": "CVE-2022-23813", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2022-23813" }, { "cve": "CVE-2022-23814", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2022-23814" }, { "cve": "CVE-2023-20522", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2023-20522" }, { "cve": "CVE-2023-20523", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2023-20523" }, { "cve": "CVE-2023-20525", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2023-20525" }, { "cve": "CVE-2023-20527", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2023-20527" }, { "cve": "CVE-2023-20528", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2023-20528" }, { "cve": "CVE-2023-20529", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2023-20529" }, { "cve": "CVE-2023-20530", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2023-20530" }, { "cve": "CVE-2023-20531", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2023-20531" }, { "cve": "CVE-2023-20532", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2023-20532" } ] }
WID-SEC-W-2023-0061
Vulnerability from csaf_certbund
Published
2023-01-10 23:00
Modified
2023-05-10 22:00
Summary
AMD Prozessoren: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Prozessoren sind die zentralen Rechenwerke eines Computers.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um beliebigen Code auszuführen, Sicherheitsmaßnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.
Betroffene Betriebssysteme
- BIOS/Firmware
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Prozessoren sind die zentralen Rechenwerke eines Computers.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in AMD Prozessoren ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0061 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0061.json" }, { "category": "self", "summary": "WID-SEC-2023-0061 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0061" }, { "category": "external", "summary": "Lenovo Security Advisory: LEN-124495", "url": "https://support.lenovo.com/de/de/product_security/ps500559-multi-vendor-bios-security-vulnerabilities-may-2023" }, { "category": "external", "summary": "HP Security Bulletin HPSBHF03846 vom 2023-05-11", "url": "https://support.hp.com/us-en/document/ish_8109529-8109560-16/HPSBHF03846" }, { "category": "external", "summary": "Dell Security Advisory DSA-2023-002", "url": "https://www.dell.com/support/kbdoc/de-de/000207371/dsa-2023-002-dell-poweredge-server-security-update-for-amd-server-vulnerabilities" }, { "category": "external", "summary": "AMD Client Vulnerabilities - January 2023 vom 2023-01-10", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1031" }, { "category": "external", "summary": "AMD Server Vulnerabilities - January 2023 vom 2023-01-10", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1032" }, { "category": "external", "summary": "Lenovo Security Advisory vom 2023-01-10", "url": "https://support.lenovo.com/de/de/product_security/ps500538-amd-server-vulnerabilities-january-2023" }, { "category": "external", "summary": "Lenovo Security Advisory vom 2023-01-10", "url": "https://support.lenovo.com/de/de/product_security/ps500539-amd-client-vulnerabilities-january-2023" }, { "category": "external", "summary": "HP Security Bulletin HPSBHF03831 vom 2023-01-11", "url": "https://support.hp.com/us-en/document/ish_7491443-7491471-16/HPSBHF03831" }, { "category": "external", "summary": "HPE Security Bulletin", "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04404" } ], "source_lang": "en-US", "title": "AMD Prozessoren: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-05-10T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:41:05.996+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-0061", "initial_release_date": "2023-01-10T23:00:00.000+00:00", "revision_history": [ { "date": "2023-01-10T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2023-01-11T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2023-01-22T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von HP aufgenommen" }, { "date": "2023-04-02T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Dell aufgenommen" }, { "date": "2023-05-10T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von HP und LENOVO aufgenommen" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "AMD Prozessor", "product": { "name": "AMD Prozessor", "product_id": "T019554", "product_identification_helper": { "cpe": "cpe:/h:amd:amd_processor:-" } } } ], "category": "vendor", "name": "AMD" }, { "branches": [ { "category": "product_name", "name": "Dell Computer", "product": { "name": "Dell Computer", "product_id": "T006498", "product_identification_helper": { "cpe": "cpe:/o:dell:dell_computer:-" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "category": "product_name", "name": "HP Computer", "product": { "name": "HP Computer", "product_id": "T023191", "product_identification_helper": { "cpe": "cpe:/h:hp:computer:-" } } } ], "category": "vendor", "name": "HP" }, { "branches": [ { "category": "product_name", "name": "HPE ProLiant", "product": { "name": "HPE ProLiant", "product_id": "T009310", "product_identification_helper": { "cpe": "cpe:/h:hp:proliant:-" } } } ], "category": "vendor", "name": "HPE" }, { "branches": [ { "category": "product_name", "name": "Lenovo BIOS", "product": { "name": "Lenovo BIOS", "product_id": "T005651", "product_identification_helper": { "cpe": "cpe:/h:lenovo:bios:-" } } }, { "category": "product_name", "name": "Lenovo Computer", "product": { "name": "Lenovo Computer", "product_id": "T006520", "product_identification_helper": { "cpe": "cpe:/o:lenovo:lenovo_computer:-" } } } ], "category": "vendor", "name": "Lenovo" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-26316", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26316" }, { "cve": "CVE-2021-26328", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26328" }, { "cve": "CVE-2021-26343", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26343" }, { "cve": "CVE-2021-26346", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26346" }, { "cve": "CVE-2021-26353", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26353" }, { "cve": "CVE-2021-26355", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26355" }, { "cve": "CVE-2021-26391", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26391" }, { "cve": "CVE-2021-26396", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26396" }, { "cve": "CVE-2021-26398", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26398" }, { "cve": "CVE-2021-26402", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26402" }, { "cve": "CVE-2021-26403", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26403" }, { "cve": "CVE-2021-26404", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26404" }, { "cve": "CVE-2021-26407", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26407" }, { "cve": "CVE-2021-26409", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-26409" }, { "cve": "CVE-2021-39298", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-39298" }, { "cve": "CVE-2021-46767", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-46767" }, { "cve": "CVE-2021-46768", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-46768" }, { "cve": "CVE-2021-46779", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-46779" }, { "cve": "CVE-2021-46791", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-46791" }, { "cve": "CVE-2021-46795", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2021-46795" }, { "cve": "CVE-2022-23813", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2022-23813" }, { "cve": "CVE-2022-23814", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2022-23814" }, { "cve": "CVE-2023-20522", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2023-20522" }, { "cve": "CVE-2023-20523", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2023-20523" }, { "cve": "CVE-2023-20525", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2023-20525" }, { "cve": "CVE-2023-20527", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2023-20527" }, { "cve": "CVE-2023-20528", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2023-20528" }, { "cve": "CVE-2023-20529", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2023-20529" }, { "cve": "CVE-2023-20530", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2023-20530" }, { "cve": "CVE-2023-20531", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2023-20531" }, { "cve": "CVE-2023-20532", "notes": [ { "category": "description", "text": "Es existieren mehrere Schwachstellen in AMD Prozessoren. Ein lokaler Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu verursachen und Daten zu manipulieren." } ], "product_status": { "known_affected": [ "T005651", "T006498", "T006520", "T023191", "T019554", "T009310" ] }, "release_date": "2023-01-10T23:00:00.000+00:00", "title": "CVE-2023-20532" } ] }
gsd-2021-39298
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-39298", "description": "Potential vulnerabilities have been identified in UEFI firmware (BIOS) for some PC products which may allow escalation of privilege and arbitrary code execution.", "id": "GSD-2021-39298" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-39298" ], "details": "A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.", "id": "GSD-2021-39298", "modified": "2023-12-13T01:23:15.918290Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "ID": "CVE-2021-39298", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "2nd Gen EPYC", "version": { "version_data": [ { "version_affected": "=", "version_value": "Various " } ] } }, { "product_name": "3rd Gen EPYC", "version": { "version_data": [ { "version_affected": "=", "version_value": "various " } ] } }, { "product_name": "Ryzen 2000 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various " } ] } }, { "product_name": "Ryzen 3000 Series ", "version": { "version_data": [ { "version_affected": "=", "version_value": "Various " } ] } }, { "product_name": "Ryzen 5000 Series ", "version": { "version_data": [ { "version_affected": "=", "version_value": "various " } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware." } ] }, "generator": { "engine": "Vulnogram 0.1.0-dev" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "name": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027" } ] }, "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:z1_entry_tower_g5_workstation_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "02.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:z1_entry_tower_g5_workstation:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:z1_entry_tower_g6_workstation_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "02.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:z1_entry_tower_g6_workstation:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:z1_g8_tower_desktop_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "02.07.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:z1_g8_tower_desktop_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:z4_g4_workstation_\\(core-x\\)_firmware:*:*:*:*:*:linux_kernel:*:*", "cpe_name": [], "versionEndExcluding": "02.75", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:z4_g4_workstation_\\(core-x\\)_firmware:*:*:*:*:*:windows_7:*:*", "cpe_name": [], "versionEndExcluding": "02.75", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:z4_g4_workstation_\\(core-x\\)_firmware:*:*:*:*:*:windows_10:*:*", "cpe_name": [], "versionEndExcluding": "02.75", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:z4_g4_workstation_\\(core-x\\):-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:z4_g4_workstation_\\(xeon_w\\)_firmware:*:*:*:*:*:linux_kernel:*:*", "cpe_name": [], "versionEndExcluding": "02.75", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:z4_g4_workstation_\\(xeon_w\\)_firmware:*:*:*:*:*:windows_7:*:*", "cpe_name": [], "versionEndExcluding": "02.75", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:z4_g4_workstation_\\(xeon_w\\)_firmware:*:*:*:*:*:windows_10:*:*", "cpe_name": [], "versionEndExcluding": "02.75", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:z4_g4_workstation_\\(xeon_w\\):-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:linux_kernel:*:*", "cpe_name": [], "versionEndExcluding": "02.75", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:windows_7:*:*", "cpe_name": [], "versionEndExcluding": "02.75", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:windows_10:*:*", "cpe_name": [], "versionEndExcluding": "02.75", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:z6_g4_workstation:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:linux_kernel:*:*", "cpe_name": [], "versionEndExcluding": "02.75", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:windows_7:*:*", "cpe_name": [], "versionEndExcluding": "02.75", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:windows_10:*:*", "cpe_name": [], "versionEndExcluding": "02.75", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:z8_g4_workstation:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:engage_flex_mini_retail_system_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "02.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:engage_flex_mini_retail_system:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:mp9_g4_retail_system_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "02.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:mp9_g4_retail_system:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elite_dragonfly_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elite_dragonfly:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elite_dragonfly_g2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elite_dragonfly_g2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elite_dragonfly_max_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elite_dragonfly_max:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elite_x2_1013_g3_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elite_x2_1013_g3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elite_x2_g4_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elite_x2_g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elite_x2_g8_tablet_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elite_x2_g8_tablet:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_1050_g1_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_1050_g1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_830_g5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_830_g5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_830_g6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_830_g6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_830_g7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_830_g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_830_g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_830_g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_836_g5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_836_g5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_836_g6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_836_g6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_840_aero_g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_840_aero_g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_840_g5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_840_g5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_840_g5_healthcare_edition_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_840_g5_healthcare_edition:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_840_g6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_840_g6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_840_g6_healthcare_edition_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_840_g6_healthcare_edition:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_840_g7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_840_g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_840_g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_840_g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_840r_g4_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_840r_g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_846_g5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_846_g5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_850_g5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_850_g5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_850_g6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_850_g6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_850_g7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_850_g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_850_g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_850_g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_x360_1030_g3_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_x360_1030_g3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_x360_1030_g4_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_x360_1030_g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_x360_1030_g7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_x360_1030_g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_x360_1030_g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_x360_1030_g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_x360_1040_g5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_x360_1040_g5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_x360_1040_g6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_x360_1040_g6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_x360_1040_g7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_x360_1040_g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_x360_1040_g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_x360_1040_g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_x360_830_g5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_x360_830_g5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_x360_830_g6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_x360_830_g6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_x360_830_g7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_x360_830_g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitebook_x360_830_g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitebook_x360_830_g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_430_g5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_430_g5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_430_g6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_430_g6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_430_g7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_430_g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_430_g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.02", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_430_g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_440_g5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_440_g5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_440_g6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_440_g6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_440_g7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_440_g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_440_g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.02", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_450_g5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_450_g5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_450_g6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_450_g6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_450_g7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_450_g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_450_g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.02", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_450_g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_470_g5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_470_g5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_630_g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.01", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_630_g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_640_g4_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_640_g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_640_g5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_640_g5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_640_g7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_640_g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_640_g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.01", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_640_g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_650_g4_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_650_g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_650_g5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_650_g5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_650_g7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_650_g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_650_g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.01", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_650_g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_x360_11_g3_education_edition_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_x360_11_g3_education_edition:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_x360_11_g4_education_edition_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.13.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_x360_11_g4_education_edition:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_x360_11_g5_education_edition_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.09.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_x360_11_g5_education_edition:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_x360_11_g6_education_edition_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.09.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_x360_11_g6_education_edition:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_x360_11_g7_education_edition_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_x360_11_g7_education_edition:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:probook_x360_440_g1_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:probook_x360_440_g1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_14u_g5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_14u_g5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_14u_g6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_14u_g6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_15_g5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_15_g5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_15_g6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_15_g6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_15u_g5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_15u_g5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_15u_g6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_15u_g6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_17_g5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_17_g5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_17_g6_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_17_g6:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_create_g7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_create_g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_firefly_14_g7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_firefly_14_g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_firefly_14_g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_firefly_14_g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_firefly_15_g7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_firefly_15_g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_firefly_15_g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_firefly_15_g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_fury_15_g7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_fury_15_g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_fury_15_g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.01", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_fury_15_g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_fury_17_g7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_fury_17_g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_fury_17_g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.01", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_fury_17_g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_power_15_g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_power_15_g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_power_g7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_power_g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_studio_15_g8_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_studio_15_g8:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_studio_g5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_studio_g5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_studio_g7_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_studio_g7:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zbook_studio_x360_g5_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zbook_studio_x360_g5:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zhan_66_pro_13_g2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zhan_66_pro_13_g2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zhan_66_pro_14_g2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zhan_66_pro_14_g2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zhan_66_pro_14_g3_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zhan_66_pro_14_g3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zhan_66_pro_14_g4_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.08.02", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zhan_66_pro_14_g4:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zhan_66_pro_15_g2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zhan_66_pro_15_g2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zhan_66_pro_15_g3_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zhan_66_pro_15_g3:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zhan_66_pro_g1_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.19.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zhan_66_pro_g1:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zhan_x_13_g2_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "01.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zhan_x_13_g2:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:260_g3_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.17.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:260_g3_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_800_35w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_800_35w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_800_65w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_800_65w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_800_95w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_800_95w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_800_g4_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_800_g4_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_800_g4_tower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_800_g4_tower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_800_g4_tower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_800_g4_tower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_800_g4_workstation_edition_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_800_g4_workstation_edition:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_800_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_800_g5_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_800_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_800_g5_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_800_g5_tower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_800_g5_tower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_800_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_800_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_800_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_800_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_800_g6_tower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_800_g6_tower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_800_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.07.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_800_g8_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_800_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.07.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_800_g8_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_800_g8_tower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.07.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_800_g8_tower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_805_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.07.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_805_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_805_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.07.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_805_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_805_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.03.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_805_g8_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_805_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.03.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_805_g8_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_880_g4_tower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_880_g4_tower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_880_g5_tower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_880_g5_tower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_880_g6_tower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_880_g6_tower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:elitedesk_880_g8_tower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.07.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:elitedesk_880_g8_tower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:eliteone_800_g5_23.8-in_healthcare_edition_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:eliteone_800_g5_23.8-in_healthcare_edition_all-in-one:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:eliteone_800_g5_23.8-inch_all-in-one_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:eliteone_800_g5_23.8-inch_all-in-one:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:eliteone_800_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:eliteone_800_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:eliteone_800_g6_27_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:eliteone_800_g6_27_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:eliteone_800_g8_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.07.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:eliteone_800_g8_24_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:eliteone_800_g8_27_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.07.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:eliteone_800_g8_27_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_400_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_400_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_400_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_400_g5_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_400_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_400_g5_microtower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_400_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_400_g5_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_400_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_400_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_400_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_400_g6_microtower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_400_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_400_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_400_g7_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_400_g7_microtower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_400_g7_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_400_g7_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_405_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.03.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_405_g8_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_405_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.03.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_405_g8_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_480_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_480_g5_microtower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_480_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_480_g6_microtower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_480_g7_pci_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_480_g7_pci_microtower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_600_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_600_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_600_g4_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_600_g4_microtower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_600_g4_microtower_pc\\(with_pci_slot\\)_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_600_g4_microtower_pc\\(with_pci_slot\\):-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_600_g4_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_600_g4_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_600_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_600_g5_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_600_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_600_g5_microtower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_600_g5_microtower_pc\\(with_pci_slot\\)_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_600_g5_microtower_pc\\(with_pci_slot\\):-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_600_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_600_g5_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_600_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_600_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_600_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_600_g6_microtower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_600_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_600_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_680_g4_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_680_g4_microtower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_680_g4_microtower_pc\\(with_pci_slot\\)_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_680_g4_microtower_pc\\(with_pci_slot\\):-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:prodesk_680_g6_pci_microtower_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:prodesk_680_g6_pci_microtower_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:proone_400_g5_20-inch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:proone_400_g5_20-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:proone_400_g5_23.8-inch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:proone_400_g5_23.8-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:proone_400_g6_20_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:proone_400_g6_20_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:proone_400_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:proone_400_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:proone_440_g5_23.8-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:proone_440_g5_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:proone_440_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:proone_440_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.18.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:proone_600_g5_21.5-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.12.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:proone_600_g5_21.5-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:proone_600_g6_22_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:proone_600_g6_22_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zhan_66_pro_g3_22_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zhan_66_pro_g3_22_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:zhan_66_pro_g3_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.10.00", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:hp:zhan_66_pro_g3_24_all-in-one_pc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "hp-security-alert@hp.com", "ID": "CVE-2021-39298" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032", "refsource": "MISC", "tags": [], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "name": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027", "refsource": "MISC", "tags": [], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0 } }, "lastModifiedDate": "2023-01-11T08:15Z", "publishedDate": "2022-02-16T17:15Z" } } }
fkie_cve-2021-39298
Vulnerability from fkie_nvd
Published
2022-02-16 17:15
Modified
2024-11-21 06:19
Severity ?
Summary
A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:z1_entry_tower_g5_workstation_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E3D0268-99F9-470C-A2C1-C8667BCE3828", "versionEndExcluding": "02.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:z1_entry_tower_g5_workstation:-:*:*:*:*:*:*:*", "matchCriteriaId": "02EB5330-7C9B-4CE4-AF6B-18D0ED8D2D1D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:z1_entry_tower_g6_workstation_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85837EF3-C3E4-4BFA-8416-2D237A6177C7", "versionEndExcluding": "02.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:z1_entry_tower_g6_workstation:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0D9DCC9-8EB2-481E-BBAF-DD738E83AC25", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:z1_g8_tower_desktop_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C872354-7197-465A-B691-3BD20A229CA8", "versionEndExcluding": "02.07.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:z1_g8_tower_desktop_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2A41ADB-202C-46AD-AFBA-6F060FA3502F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:z4_g4_workstation_\\(core-x\\)_firmware:*:*:*:*:*:linux_kernel:*:*", "matchCriteriaId": "DC137328-5573-4781-8DA2-B135CD44533A", "versionEndExcluding": "02.75", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:z4_g4_workstation_\\(core-x\\)_firmware:*:*:*:*:*:windows_10:*:*", "matchCriteriaId": "6E2C4D23-D2FA-4C89-B4C2-C775A17A21C0", "versionEndExcluding": "02.75", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:z4_g4_workstation_\\(core-x\\)_firmware:*:*:*:*:*:windows_7:*:*", "matchCriteriaId": "ADA3082C-BC33-4464-8FC3-F45A859A2DB8", "versionEndExcluding": "02.75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:z4_g4_workstation_\\(core-x\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "AEAD0B9A-B36F-4C48-AFBB-D71192899993", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:z4_g4_workstation_\\(xeon_w\\)_firmware:*:*:*:*:*:linux_kernel:*:*", "matchCriteriaId": "D9B59BE0-2D53-4D59-846B-80F47B7B836E", "versionEndExcluding": "02.75", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:z4_g4_workstation_\\(xeon_w\\)_firmware:*:*:*:*:*:windows_10:*:*", "matchCriteriaId": "88774B45-D51B-4971-9FD0-AA15523F3788", "versionEndExcluding": "02.75", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:z4_g4_workstation_\\(xeon_w\\)_firmware:*:*:*:*:*:windows_7:*:*", "matchCriteriaId": "FF6DFFBF-C17E-4FF7-B4A9-693D42A1C42B", "versionEndExcluding": "02.75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:z4_g4_workstation_\\(xeon_w\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "69EBF60B-E2A4-492B-A58F-2A01B77AE74A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:linux_kernel:*:*", "matchCriteriaId": "83CC465C-DFFD-4C9C-881C-97B59410EC36", "versionEndExcluding": "02.75", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:windows_10:*:*", "matchCriteriaId": "790D9AFB-2AFC-4635-A556-3C91403FE6BD", "versionEndExcluding": "02.75", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:z6_g4_workstation_firmware:*:*:*:*:*:windows_7:*:*", "matchCriteriaId": "77E66B91-184D-49B5-9685-96995F2B1C07", "versionEndExcluding": "02.75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:z6_g4_workstation:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD26B60-086E-4C83-B3EB-CA4981AAAF7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:linux_kernel:*:*", "matchCriteriaId": "EA52B0BD-5AF3-4079-B25B-993CA85CB115", "versionEndExcluding": "02.75", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:windows_10:*:*", "matchCriteriaId": "6D033ECD-5E03-4A57-AA34-BA92A6525865", "versionEndExcluding": "02.75", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:z8_g4_workstation_firmware:*:*:*:*:*:windows_7:*:*", "matchCriteriaId": "BAFCE15A-5D6A-4AB1-AC68-4AB1E0E55EFF", "versionEndExcluding": "02.75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:z8_g4_workstation:-:*:*:*:*:*:*:*", "matchCriteriaId": "068354B9-5842-4014-A466-011FA1AA62B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:engage_flex_mini_retail_system_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB0213EB-A71F-4CB0-8D14-4A0C7008B59C", "versionEndExcluding": "02.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:engage_flex_mini_retail_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "8187C850-4BB8-474A-B5D2-09560AAF47D7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:mp9_g4_retail_system_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0C3ABB0-30EE-402A-A655-EF1AB8CFDEE4", "versionEndExcluding": "02.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:mp9_g4_retail_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B81932E-C047-45A8-80DD-32E19351D675", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elite_dragonfly_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4FCCC71-FA95-43DD-9874-FC873252B614", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elite_dragonfly:-:*:*:*:*:*:*:*", "matchCriteriaId": "119A1751-0FD4-4FA7-8681-CC82C4D47BFD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elite_dragonfly_g2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83CE6347-D6CF-421E-A8B4-D087E4C242F6", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elite_dragonfly_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "28829816-379A-43CA-B2B0-2DDC32C9EFA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elite_dragonfly_max_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AC42EBC-B581-4102-B614-C8DDB37A5ED8", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elite_dragonfly_max:-:*:*:*:*:*:*:*", "matchCriteriaId": "301EE3DA-31B5-44E3-B6B7-1E3A87B24F65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elite_x2_1013_g3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5199F27-D189-4663-AC00-7C63A4BD9900", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elite_x2_1013_g3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E086097A-D53C-4AD2-891E-FEF5EE21B6AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elite_x2_g4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DD025A26-8ED9-4A81-AE2D-DFEDBAE336D8", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elite_x2_g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "72682A82-B694-4CE0-9B88-DCAAC8A6C8B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elite_x2_g8_tablet_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FC3266B-99F0-4F25-B923-154522B8833B", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elite_x2_g8_tablet:-:*:*:*:*:*:*:*", "matchCriteriaId": "C181FFEA-FF8C-4FFF-AB13-6F660FD54737", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_1050_g1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7D6965EE-5FA5-4DD5-B1B7-339181E90A00", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_1050_g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F4E2D01-4CC3-4FBB-8B49-0C087DC580FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_830_g5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8AD6BBB-F010-4A24-A958-FD91303C46FE", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_830_g5:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E8BCBD1-AB54-4160-9FEC-426B3905A56A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_830_g6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4582CD80-9128-41C3-8F11-268B3C484E97", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_830_g6:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A8707F9-46CB-48F7-8CFA-EE90F44D5585", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_830_g7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7036932C-2519-4415-B770-65F9E87B4C8D", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_830_g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "127371E2-74C1-41E8-8D0C-8551E4B6A656", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_830_g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA6A472F-0B69-46EC-A8B7-E6D35BB54EA1", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_830_g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "D306687B-3EF9-40B4-88E1-F9840FBF332C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_836_g5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "31B20FC9-4E17-49A9-9ADB-51023CA8DE4C", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_836_g5:-:*:*:*:*:*:*:*", "matchCriteriaId": "A30065E2-A918-499B-864F-50C12E7699EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_836_g6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F815D088-2416-4DDB-BE7A-8DEF2C79266B", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_836_g6:-:*:*:*:*:*:*:*", "matchCriteriaId": "663E72B3-5986-434C-B395-43CF1A461A55", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_840_aero_g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A01005B3-2613-4991-9D13-186E5EE129AD", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_840_aero_g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5446ABE-8540-4DF0-A3EA-BEE74199856C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_840_g5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0890E78-D869-45C4-8FE9-023B7392230B", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_840_g5:-:*:*:*:*:*:*:*", "matchCriteriaId": "36FA123E-719F-465F-A89C-D15E79360A96", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_840_g5_healthcare_edition_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5EB5590-0502-4DD2-82EE-B0E996BA7853", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_840_g5_healthcare_edition:-:*:*:*:*:*:*:*", "matchCriteriaId": "370DA2D2-F41F-4569-A58D-A38C6B9AC01B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_840_g6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8449A10-2386-4BC9-B6A7-4D7B724D5E5F", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_840_g6:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5091726-485B-4F0D-A451-8FA3FF10B952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_840_g6_healthcare_edition_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B353663-91A0-49C5-BF31-F066635D77AC", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_840_g6_healthcare_edition:-:*:*:*:*:*:*:*", "matchCriteriaId": "02654E2D-30A7-4A07-AD0A-10402AD2CD7D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_840_g7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CC73DD1-8996-4A07-BB7F-3CAD5B8DF839", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_840_g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A024B6E-6F91-47AB-B29D-659A7F2A0595", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_840_g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "24DE0204-652E-4E87-A605-68C2EDFAAFBE", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_840_g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "A27335B7-81BA-4A1D-922B-CE34EBD31A60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_840r_g4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71359566-0D9E-4558-BCC6-AAB4A37CF793", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_840r_g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFF12568-610A-40BA-A29D-946298512F74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_846_g5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "650BE1D6-4959-4B52-B764-48A480E88F4B", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_846_g5:-:*:*:*:*:*:*:*", "matchCriteriaId": "74BBE35C-34BF-49B0-9501-7A6ABE8799E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_850_g5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D663A797-6C56-497F-BF1C-506D22F05F00", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_850_g5:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC2EB22C-6899-4C3B-BA7D-882351D6FC2E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_850_g6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BBD65A6-642F-47F1-B6B2-9EE97A9DEC2C", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_850_g6:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC02312C-289C-445B-8FC6-D5854EA44F87", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_850_g7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBBAD7A6-FF7C-4667-B9F2-1E8A9BF14590", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_850_g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6F752EC-E05D-416D-99D3-7DEFDA160755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_850_g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C66FCA12-6232-45AF-8545-6308EE5DA86F", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_850_g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCEF5B4C-DB2B-4406-8EE1-7E5A63E89045", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_x360_1030_g3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "586AC3DA-3CF3-4746-80B6-13459109A4DC", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_x360_1030_g3:-:*:*:*:*:*:*:*", "matchCriteriaId": "79A72152-CDBC-4709-B484-9259E9EAB82D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_x360_1030_g4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FFAF331-B433-4672-AF2F-4CEFC9CE1251", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_x360_1030_g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "201BF348-CDDE-4ED8-9339-0830AEE5B208", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_x360_1030_g7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B652E6FF-4AF9-4CD2-BA26-D71DE4FC4721", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_x360_1030_g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "56DFE16C-A6BC-485F-A77F-A892889BBB64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_x360_1030_g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40E842B2-E3FB-43DA-9BD3-18D77258C6BC", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_x360_1030_g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C27ABA-63FC-4DCE-925A-1C8A3D5D73F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_x360_1040_g5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6721D77-E09B-4F2F-BA6F-CB3265010486", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_x360_1040_g5:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B86EC79-4160-4118-8D0B-4CBA069976E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_x360_1040_g6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0CD1A70-9F2E-4B9D-A2C7-B280C0B9642A", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_x360_1040_g6:-:*:*:*:*:*:*:*", "matchCriteriaId": "485F527D-CED9-4865-BF19-0E474ED5C177", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_x360_1040_g7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91A0AF80-8759-41C5-B0F2-370B96647271", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_x360_1040_g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E98FB1B-AC60-4432-B67A-926DF0F7AFD4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_x360_1040_g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0EC0782-B8AF-4B2B-B8F5-BBBA95CEB010", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_x360_1040_g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F3FE302-C270-4C5E-B8AF-A140843E7E3C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_x360_830_g5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43CD2A63-737A-4D74-BFE7-4FDDD21968E9", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_x360_830_g5:-:*:*:*:*:*:*:*", "matchCriteriaId": "17C439DA-9B30-47B3-843C-B3A220A5159D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_x360_830_g6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD3E5AE3-EF42-420C-A29F-9F5F06B7B974", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_x360_830_g6:-:*:*:*:*:*:*:*", "matchCriteriaId": "707ACE08-2017-4A78-837F-BEBC02929E99", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_x360_830_g7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00A1EFA0-07AB-430D-B9ED-7F6F84EDDE67", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_x360_830_g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDDE2542-2C2F-4295-91A1-F09E308C5B5F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitebook_x360_830_g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDE0DC18-44CA-4191-A787-555C773DAFAA", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitebook_x360_830_g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "87B40BA1-1F6C-4786-9F33-52EEF0ADE083", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_430_g5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BD781FA-CF82-49DF-AD6A-C54B5659259F", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_430_g5:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FE8B02E-2DBD-4E4D-9B8B-E6E916709327", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_430_g6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B5C798F-9C96-4C99-9F70-026F3B3657B5", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_430_g6:-:*:*:*:*:*:*:*", "matchCriteriaId": "14F18988-4CB2-43D3-ACC5-882695D713D8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_430_g7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E1D6CC1-C0CD-472F-8C9E-00F27B4C8B5F", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_430_g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "99C64369-5FDB-4584-AAB6-C87B95DA5FB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_430_g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "54AB35E4-8827-4848-853D-B392C7C88F27", "versionEndExcluding": "01.08.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_430_g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "986AAA40-9DC9-4D20-A4DA-2D02636C1A62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_440_g5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FD1C410-2224-4272-B178-562E5AE9A94B", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_440_g5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AD00A6D-426F-4470-A07C-A9E319A813B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_440_g6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F243AEAD-C4FD-4F39-8D55-CE26F364BF3A", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_440_g6:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C45C4B7-1E60-40C3-AE9B-1928CFDD15BA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_440_g7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F188BF61-13A7-4994-ABAC-3BA8DF74FD0E", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_440_g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "F28CBAEA-21E2-4FB5-A3DF-B20145F63322", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_440_g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "467B4707-142A-4A2A-851E-06D1C46791ED", "versionEndExcluding": "01.08.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_440_g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F93D1E8-C7A7-4B35-9389-AAC3DD0FA978", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_450_g5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D190CAC-76EA-4436-8254-9DED818C4512", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_450_g5:-:*:*:*:*:*:*:*", "matchCriteriaId": "7910C11F-B709-45DC-B4EB-92B7A2001E13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_450_g6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C7D1DD2-CFBB-4E3E-8B48-214B014A13F0", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_450_g6:-:*:*:*:*:*:*:*", "matchCriteriaId": "B92A898F-BBDC-48B8-9159-8E0CD67AD6ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_450_g7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE3751D6-2B81-41FF-A8E7-D4BD7AD4B87D", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_450_g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7A4B95B-48FA-493B-986C-F4E0C5E20183", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_450_g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6BA2A031-1AEB-4B3A-A173-BACF3EBFFA09", "versionEndExcluding": "01.08.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_450_g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1982269-50DD-4939-8158-4B7357D7AEE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_470_g5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E5E3301-3D69-4380-B96F-1F3E0FC5C375", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_470_g5:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D9871C2-D63F-4623-B8E0-1356A48554FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_630_g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A52563B-DFAD-4F28-A939-1A2AE28983AA", "versionEndExcluding": "01.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_630_g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "80EF159A-302D-4F73-8A08-683805B051A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_640_g4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DC2695D-8CDE-4208-8A16-E8F7F5151A9C", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_640_g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E458FE6-3295-4982-BCCD-8BF1BDBCA8B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_640_g5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "126B6E1B-5CBD-4B22-9885-C86B9C3D5737", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_640_g5:-:*:*:*:*:*:*:*", "matchCriteriaId": "657F2CA6-D464-466F-BB6F-11316D3E27DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_640_g7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04DBCD9D-54E4-47C3-8155-7367D9E43BFB", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_640_g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D01A2D5C-89B8-4609-909C-245DF7A15912", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_640_g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F7BE714-F56C-4EEE-9FC0-543FF17AF860", "versionEndExcluding": "01.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_640_g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6351F53-2458-47FB-B547-C56691B7CF50", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_650_g4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD13471F-E05D-4ECB-BCA4-AA34B495B1AC", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_650_g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "389760F8-5B6B-40DD-9F8D-A542CABBD4FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_650_g5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8AFD1502-C6CE-4971-8ADB-5A4DC2F8B4B8", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_650_g5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8F15254-6AF1-4495-B89F-F58084D11D36", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_650_g7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49971E3F-92A1-4A9F-91FF-91DEBF6E8BB0", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_650_g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3AE72B1-6CEF-4F42-8196-8B260F3ED219", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_650_g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "738DA3C3-B7C4-4537-99B5-F4A2EDB478AA", "versionEndExcluding": "01.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_650_g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED793F1B-C4A0-41B7-856B-20CF33308750", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_x360_11_g3_education_edition_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "769A944E-5259-4B7C-AC91-76497981621E", "versionEndExcluding": "01.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_x360_11_g3_education_edition:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DC67078-7715-4A45-A1B4-89D2B7196AE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_x360_11_g4_education_edition_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B911F5A-1032-4AD2-AB5F-19DC2BAD892A", "versionEndExcluding": "01.13.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_x360_11_g4_education_edition:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE118D9C-6CCF-4063-891C-A87E5CEAA181", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_x360_11_g5_education_edition_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "28FFF7D0-03C4-4B20-9666-A58B8A1CF6C7", "versionEndExcluding": "01.09.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_x360_11_g5_education_edition:-:*:*:*:*:*:*:*", "matchCriteriaId": "151C6B17-477C-44F7-8701-DA9E35981379", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_x360_11_g6_education_edition_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81BF086A-9043-4279-B0BB-C28E5266CF8B", "versionEndExcluding": "01.09.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_x360_11_g6_education_edition:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3688601-B128-4BEA-980D-DC3325343662", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_x360_11_g7_education_edition_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "479DA25B-CBBA-4735-8366-19C97F2E1114", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_x360_11_g7_education_edition:-:*:*:*:*:*:*:*", "matchCriteriaId": "48A3E458-BE55-437B-9303-CCAE23C40ACE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:probook_x360_440_g1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "31412E71-045E-4B40-8F28-CDC0873104A9", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:probook_x360_440_g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "7532BAA7-ABDC-4283-91AC-56A30994F0BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_14u_g5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BFA7B22-C27D-4948-B262-711961B578CF", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_14u_g5:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DF860CD-924C-4A15-AD82-FDBCF7C13F43", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_14u_g6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF4C9066-374E-4E80-B869-C1434780D6F6", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_14u_g6:-:*:*:*:*:*:*:*", "matchCriteriaId": "740E81D7-398A-4DDE-92A7-B89BABCEB4FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_15_g5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "135441B1-A6F3-40F1-A130-91F1EC8FA1DD", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_15_g5:-:*:*:*:*:*:*:*", "matchCriteriaId": "03B95D51-A675-4995-9F43-0C53CC7C9035", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_15_g6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8728F160-4B47-42BB-9346-0683B67AD29A", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_15_g6:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECC561D0-0216-4517-A551-166557FC5D1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_15u_g5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD4767AF-B638-4DCF-91FB-D13DA49BCB37", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_15u_g5:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D2F25C8-CCFC-47BA-B7F9-A86478245203", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_15u_g6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "19DCA0C1-E526-4DF3-8599-B59219589FF0", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_15u_g6:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F2EFA3E-8FDC-435B-AED8-4146826934E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_17_g5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED250C9F-E60F-4E78-81F2-7EACCD5FB58C", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_17_g5:-:*:*:*:*:*:*:*", "matchCriteriaId": "17DC385C-6789-4F1C-9280-9E5C7DE8EA11", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_17_g6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2385933-DF9C-47A8-8565-D8EAF3549FA5", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_17_g6:-:*:*:*:*:*:*:*", "matchCriteriaId": "27439B52-B175-4D6F-8AE0-2D8648789D4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_create_g7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "04A693EA-9603-4D91-AA9F-BE4A3AC86B38", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_create_g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "F61956A9-8CFB-4B96-B068-878E0CFF13BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_firefly_14_g7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "020F41F8-69D4-4118-8CA0-E3752FFC60E0", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_firefly_14_g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8669346-38FA-44C5-A712-2C0FCCFDD44E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_firefly_14_g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "726C41E6-F299-4026-BADD-BC37D026E0D9", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_firefly_14_g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "381B4451-AB62-444A-B34A-108EF21D84D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_firefly_15_g7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F364173-9EDE-4C39-BABB-9F3538035B53", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_firefly_15_g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "A07A7FB8-9EB1-46DE-9AD7-07D4DC2A7E06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_firefly_15_g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "640C9068-7E29-4BC2-9C59-DBD405A7A368", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_firefly_15_g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADBEE86-6EB5-4892-BAFE-AD37FFD13849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_fury_15_g7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D964C206-5B2B-45F3-BAD2-489572A792F4", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_fury_15_g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC03BC1C-7FC2-4EC7-A806-8717413B1AED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_fury_15_g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C77CD9B3-A3D1-4FA6-9E40-C14A6F79AB82", "versionEndExcluding": "01.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_fury_15_g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "168E3BC4-9ED6-4863-B6E8-458EEF9E7339", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_fury_17_g7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15F9EE0F-A8A6-4888-98F5-4AF74425AD31", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_fury_17_g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7ECCEB4-60B6-454D-96F1-1CAAEA7CD223", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_fury_17_g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A0E656A-7904-4A2A-987D-53B9FD38D2E6", "versionEndExcluding": "01.08.01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_fury_17_g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "64BAA40E-D254-463B-976F-A75898E20E67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_power_15_g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4840180D-E1E1-4550-985E-42AC49384E82", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_power_15_g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2312856-3674-475E-8450-4D10D9A5A9DC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_power_g7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "94DDD00B-487D-4839-BEB5-8748AD772C51", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_power_g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC5BA7CE-6BF2-408F-8B50-07B897342E52", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_studio_15_g8_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B376E11-11D9-46D6-ABA0-FF1EA0645DEB", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_studio_15_g8:-:*:*:*:*:*:*:*", "matchCriteriaId": "24FB7C62-AD79-4F7A-8AA4-27B744B5F26C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_studio_g5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB6FD126-4865-4855-9A4E-BD08FFFA66C7", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_studio_g5:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9D3558A-C998-40B9-9E52-5F581B74A3F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_studio_g7_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "271CCD58-E2D1-48B4-9871-1C6A5F1B25AF", "versionEndExcluding": "01.08.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_studio_g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9E44F4E-85E6-471A-A85D-4D7B09B69F0C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zbook_studio_x360_g5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B0202EB4-0693-43ED-B1C6-7B028701A957", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zbook_studio_x360_g5:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DA80A29-3C98-4767-B784-F2A13097741E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zhan_66_pro_13_g2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C4B45DC-DA76-48A6-8D98-D522128EE7FB", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zhan_66_pro_13_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "3AB9C53B-328F-449C-9137-D20B72031D8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zhan_66_pro_14_g2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1224114D-B82D-4A80-91CC-4CC6C29A00C3", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zhan_66_pro_14_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFA26D63-E18E-4AB8-950D-904CF3D62EB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zhan_66_pro_14_g3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E87ADF-4724-46E0-B67B-0C54649BC659", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zhan_66_pro_14_g3:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DA9E826-6EAA-45EE-8613-46EE025ECD65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zhan_66_pro_14_g4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D89DF58D-EE3A-41EA-848F-468E07780FF1", "versionEndExcluding": "01.08.02", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zhan_66_pro_14_g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9B9E550-4D16-430D-813E-B425BAFEA4C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zhan_66_pro_15_g2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29A11166-864C-42FE-AADA-8B04C274D921", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zhan_66_pro_15_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "36603B4C-F5C6-4075-BEB1-90401B5D3A2D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zhan_66_pro_15_g3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27D066B2-7A97-4948-AC59-430B87E18E92", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zhan_66_pro_15_g3:-:*:*:*:*:*:*:*", "matchCriteriaId": "69B4D838-F2FC-4F7B-B606-9F005D125FA1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zhan_66_pro_g1_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "61429F91-58E2-48EE-9E50-F3B9D1AE2915", "versionEndExcluding": "01.19.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zhan_66_pro_g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "3654A9CC-CBF9-4045-A929-1458A2AE99FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zhan_x_13_g2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FADB9E91-4397-40C8-BF24-4BB0683EC8F6", "versionEndExcluding": "01.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zhan_x_13_g2:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C5FBB0A-9A79-482F-9E59-2291712BD161", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:260_g3_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "548B6DE2-E251-4D58-81AD-884F4576AE55", "versionEndIncluding": "2.17.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:260_g3_desktop_mini_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7565B63-6B13-4F72-9538-845635B945DF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_800_35w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "386FBD67-6C2C-4C60-93E6-0A308E5DDF3F", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_800_35w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D22A07E-3033-4B61-B366-E09FE72DF08B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_800_65w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FA20789-20F8-468C-BA4E-8F6C25A7D5C7", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_800_65w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB6F5B7-5248-45C8-B83E-5ADD8077E9D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_800_95w_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8675000-C780-4AAC-B110-A62B45878D73", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_800_95w_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3D567DE-9D36-4B40-8847-AAD14E253CAB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_800_g4_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1453A48-B267-4B3C-A0C2-5A39468613DB", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_800_g4_small_form_factor_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7A503FF-6FAB-4B98-A01C-EEE0880EBCB1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_800_g4_tower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDBB384C-D46F-4018-A5FD-B4E3E7495A02", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_800_g4_tower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D53396C-8599-4D9E-9147-2C47945AF38C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_800_g4_tower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DDBB384C-D46F-4018-A5FD-B4E3E7495A02", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_800_g4_tower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D53396C-8599-4D9E-9147-2C47945AF38C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_800_g4_workstation_edition_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21AE541E-EC44-4A11-B5C1-3735C9EB92E4", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_800_g4_workstation_edition:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DE7353B-4944-4703-B17D-FF73328D6B9F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_800_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5252DEB-5D25-420C-956C-0613C6956C04", "versionEndIncluding": "2.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_800_g5_desktop_mini_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "03790B11-60F3-4467-9159-2C5395235239", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_800_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4215483-D174-4000-9692-AA4576FBB13A", "versionEndIncluding": "2.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_800_g5_small_form_factor_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F8E6C68-1086-4EA8-B8D0-E9EE9B9270F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_800_g5_tower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C13165A-DA77-4CAC-B9A6-81559E771AAF", "versionEndIncluding": "2.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_800_g5_tower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BA51C81-1D34-4747-A262-B28566BB097E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_800_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01AF91A0-282E-4E3E-96CB-1866CC6F9298", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_800_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "82BF1386-C43B-4B27-BF7C-26D0FAF13B1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_800_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F2F3943-84C1-4C4E-9E90-95BF31C3C561", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_800_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C2BEB8B-BA79-4B40-8A35-6CD2545E1595", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_800_g6_tower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEE243D0-FF62-4409-8EBB-F36B03E39B85", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_800_g6_tower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "44A8DAD6-9F6D-4AC6-976C-3D4EC566A1CE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_800_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EE96B118-36B1-47F0-BD79-7442105C6F87", "versionEndIncluding": "2.07.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_800_g8_desktop_mini_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "5993123E-068C-498A-B17F-8D9A45BA4510", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_800_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7657C542-ED48-4A86-B9D1-56D1C69EF3C8", "versionEndIncluding": "2.07.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_800_g8_small_form_factor_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CE2056B-7AFB-40C7-B16D-891EFFD9C29C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_800_g8_tower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6A91A8D-F8E6-4575-983D-E7DA65070B18", "versionEndIncluding": "2.07.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_800_g8_tower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E0679C9-65D0-48D6-A7B2-60B3411AEF84", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_805_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E3556A6-20CA-4FF7-B79F-B7042B723A45", "versionEndIncluding": "2.07.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_805_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "E433E3CE-8920-4FE2-8C9E-06E02D5EF5B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_805_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A708017F-2D47-4BC3-B558-BE53FE45BF3C", "versionEndIncluding": "2.07.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_805_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "614C6061-751F-4F8D-BDB0-225B0AD9779A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_805_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35027039-EEC5-453C-B5CA-0E008B8B986C", "versionEndIncluding": "2.03.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_805_g8_desktop_mini_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07D9459-D011-4C13-A406-5DA58AD88080", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_805_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73BB2DA7-7D09-4685-B5AC-6E9315E42A65", "versionEndIncluding": "2.03.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_805_g8_small_form_factor_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "03B881AC-BAA0-495C-B336-050C25A2420B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_880_g4_tower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3945E498-B34F-491A-B67D-496AC7D24CC6", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_880_g4_tower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "69BF32D7-1115-4971-BE35-2254A6C566F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_880_g5_tower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0AFEC77-9B32-4353-B81A-0EED73CA0467", "versionEndIncluding": "2.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_880_g5_tower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB467DC-D239-4459-BF9C-041D8EB8F51B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_880_g6_tower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EF60D396-C1B8-41EB-9560-3BBB9655B33D", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_880_g6_tower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA5CE713-B07E-49C8-88CB-B16FA4752B16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:elitedesk_880_g8_tower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D244F930-2B60-4769-8CD4-9C042038ED7D", "versionEndIncluding": "2.07.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:elitedesk_880_g8_tower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "C276DE51-141A-49D0-9BE4-9F740D5A2F44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC8D3CEB-F5AF-4FB2-8E7B-61C1BF11D703", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "D93B88FF-5E57-4DD9-9568-26306D068230", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4823EE58-C174-4C60-B0D9-96B682E79EB3", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:eliteone_1000_g2_23.8-in_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AEF73CA-7A05-4650-9081-0A501D09F551", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "841E0FD7-2512-46F2-8DB0-10747FC421B9", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:eliteone_1000_g2_27-in_4k_uhd_all-in-one_business_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "449CD858-582B-49CA-95CB-AFDD5302ACE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "324459DB-65E9-45EA-9333-95F956CA25BA", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:eliteone_1000_g2_34-in_curved_all-in-one_business_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E4CB0D3-2948-4D9B-8C48-CE6E9A8A2FAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "232C50AA-162B-4D0D-B2D9-2E4BD99AEE72", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:eliteone_800_g4_23.8-in_healthcare_edition_all-in-one_business_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "79906731-74C1-4081-822F-29D0095F038A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F87CD4E9-0981-49E2-BD14-C71BFC01C121", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_all-in-one_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "6457F0D4-E6C7-414A-AAAD-0F61FFE8BA72", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2BAAFD8-523E-449C-99FE-3E04D27C9DAB", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_non-touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "4192B127-7DDA-47BA-A441-013061097ED9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5948DFE1-A3DB-4747-AEC9-1256CAE386AA", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_all-in-one_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C30F26F-C63A-4C95-AFAB-7B49B29C667C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C192881-CA4D-476A-AB86-6455CAFC797D", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:eliteone_800_g4_23.8-inch_touch_gpu_all-in-one_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "66ED0BFA-33B9-4850-A934-DCE0399BBC67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:eliteone_800_g5_23.8-in_healthcare_edition_all-in-one_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "20AE11EE-CD36-47A4-8245-8AA8DE777EFB", "versionEndIncluding": "2.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:eliteone_800_g5_23.8-in_healthcare_edition_all-in-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E633AD8-5971-4E37-86BD-83B309D1776E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:eliteone_800_g5_23.8-inch_all-in-one_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35F011A8-0688-436A-89B2-E85C149B3549", "versionEndIncluding": "2.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:eliteone_800_g5_23.8-inch_all-in-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFC825D4-65D1-40BE-AAFB-9A1D117DE069", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:eliteone_800_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1BDA03D-946E-4C24-B699-C1EE5F9B667C", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:eliteone_800_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DE92A90-5580-4BF6-B73F-ECEA4693048D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:eliteone_800_g6_27_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEAAB0F3-49B9-4AA8-8D9B-69B2246E3B23", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:eliteone_800_g6_27_all-in-one_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "888AC622-8FB4-4D17-846F-1F9CCBB7EBFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:eliteone_800_g8_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "474023E5-9A9D-46A1-B414-A73002CFA76F", "versionEndIncluding": "2.07.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:eliteone_800_g8_24_all-in-one_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "24380823-8372-4989-8EB9-46390A258B7E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:eliteone_800_g8_27_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FCD473F-0C75-4D81-B086-7AADEADBFCDE", "versionEndIncluding": "2.07.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:eliteone_800_g8_27_all-in-one_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "919973B8-DA48-410A-B3D4-43A56E7BE381", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_400_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "818F199A-8694-42CE-9EA4-FEC1350EB9AB", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_400_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "7970A0E9-64DC-4CA0-A9CA-D06B2BBC42AF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_400_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8C5156B-E69D-4835-8E16-7BAB67AD89DC", "versionEndIncluding": "2.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_400_g5_desktop_mini_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "E95BF30A-1785-4DE1-8272-29196C362C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_400_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6DECC12A-E49B-44D8-A04D-F00EC4C2AB7F", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_400_g5_microtower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B2CA843-228C-42FE-8236-1C99B30862E1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_400_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5B16CEC-8139-4E89-94EA-D5E297CEA431", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_400_g5_small_form_factor_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D168C72-E7A0-490C-A09C-A075F0C2BFB9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_400_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "739D9744-B075-40D0-AE69-90A5F6C5CA13", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_400_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DDBB3E4-A059-4DE9-B887-EAD8D0E34627", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_400_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FA0D65A-39F2-4205-A97E-5EED1A18B643", "versionEndIncluding": "2.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_400_g6_microtower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "5627AA12-2392-40E8-8A60-2B7FCA939DD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_400_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C93C14D-E95D-44B9-B13A-E622D7E11848", "versionEndIncluding": "2.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_400_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "A41C8C9E-FCCA-4943-B4AF-7E252175619F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_400_g7_microtower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E3C53A9-F529-4B69-B83A-9B69160C4888", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_400_g7_microtower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "87157F17-55C7-4B67-A569-553DED315A2B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_400_g7_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CABF07C3-5398-4632-9637-A36FCD1040C4", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_400_g7_small_form_factor_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF55615F-4964-4A6A-91E4-1DF00ABA9F98", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_405_g8_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D828606A-FE16-4E48-A29E-3FB90BECEA27", "versionEndIncluding": "2.03.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_405_g8_desktop_mini_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "6089CFE4-9A55-484A-92DD-06ADA6C44792", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_405_g8_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8AC88BE-779A-45CD-95FF-1CE541158112", "versionEndIncluding": "2.03.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_405_g8_small_form_factor_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFAC2E25-2018-45F3-AF42-CE770A88384B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_480_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "232C554F-C097-4382-80B2-E2D833529142", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_480_g5_microtower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "97D3F8A6-877D-4819-A101-B85498D4AB2E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_480_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B69F84E-FFC4-4CE3-8710-6D75919A2BFC", "versionEndIncluding": "2.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_480_g6_microtower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E56B264-71E2-4498-AB2D-F4EF3D1BD146", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_480_g7_pci_microtower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CFCEF0C-BFA2-48FF-AE4A-43181D71444C", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_480_g7_pci_microtower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "170C9213-D9D3-4528-8FA7-B4731A74CC36", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_600_g4_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FF3CF3A-622E-4C32-AF6F-9D6C89F1B662", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_600_g4_desktop_mini_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDBB1855-A92B-4514-B0DE-CBD6D425866A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_600_g4_microtower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "788D9187-602F-492F-89D1-BA1C15ED8CDC", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_600_g4_microtower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "50DCF6A1-3209-4743-B1A5-774FE0BF25C9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_600_g4_microtower_pc\\(with_pci_slot\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71ED3A81-58FF-4457-B995-42FF769F44B4", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_600_g4_microtower_pc\\(with_pci_slot\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "CF4AD5C3-C195-43C0-A3BA-890DD752D31D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_600_g4_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2ECE739-98D4-4C76-A212-80DF4E81B0C5", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_600_g4_small_form_factor_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "A342E698-B741-4A24-A797-0940C007770F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_600_g5_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F7A380E5-6EC1-426D-ABBD-2E5C0556777B", "versionEndIncluding": "2.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_600_g5_desktop_mini_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "168198E7-A2E4-4701-9088-1812C481EC44", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_600_g5_microtower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BABD24F3-71E3-4B49-82CA-C9961C423C33", "versionEndIncluding": "2.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_600_g5_microtower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "886E5433-52EE-4640-BC7D-52B96F1462EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_600_g5_microtower_pc\\(with_pci_slot\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC2B81EB-3D9B-4F12-8B09-D33C029CDDD2", "versionEndIncluding": "2.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_600_g5_microtower_pc\\(with_pci_slot\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "A15C647C-9BFF-46AD-86D4-EC298251082E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_600_g5_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43096AA3-F1F0-4DA3-93CD-4C71727E00CB", "versionEndIncluding": "2.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_600_g5_small_form_factor_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "5443815D-8487-423B-90C1-CE2BD0FCA5E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_600_g6_desktop_mini_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50165F13-7A1C-4447-A3DB-04B1E95FB002", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_600_g6_desktop_mini_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC90581B-B895-42A7-993C-1EF1F6B6F3B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_600_g6_microtower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AD72972-49A9-409E-9109-5CB0F03F0C0C", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_600_g6_microtower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "907BAC5B-0AC3-42CD-B145-754639D19E1C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_600_g6_small_form_factor_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FC526D5-5D25-4C0C-935B-2282B3C162E1", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_600_g6_small_form_factor_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E88C11F-4494-4E85-9ABC-9EC2A6000D4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_680_g4_microtower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D7C1521-68B1-4602-AB5E-A3BB4C8356F1", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_680_g4_microtower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "565542BE-1CF9-49B9-AAA3-36ACC2A4542A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_680_g4_microtower_pc\\(with_pci_slot\\)_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2623895-0CD2-475A-B320-B603CF727E5F", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_680_g4_microtower_pc\\(with_pci_slot\\):-:*:*:*:*:*:*:*", "matchCriteriaId": "8DB4EEC5-121D-4F96-96AF-88B83CD81D70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:prodesk_680_g6_pci_microtower_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07392785-E50B-4CA6-B835-0FB15D0006A3", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:prodesk_680_g6_pci_microtower_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "11DB0F11-8DCE-4107-9F44-84719BCA0813", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1131C8E-63D8-49E8-BDBE-27AF01FCC23B", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:proone_400_g4_20-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "45AB7CC1-0758-4734-9B6A-7F8CF6107F6D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DCA47E40-DF50-44E6-A262-6C73497CCE25", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:proone_400_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "68F00E1A-4DE9-4279-8C8B-3B6950B94354", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:proone_400_g5_20-inch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "477C1943-D5CC-4780-9EBA-641DB2B441A0", "versionEndIncluding": "2.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:proone_400_g5_20-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "84E759D0-5DD6-4FD2-A19B-AEC9EF794B49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:proone_400_g5_23.8-inch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39D34B53-DBEB-4CF6-8B00-AFDA9A64B0EC", "versionEndIncluding": "2.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:proone_400_g5_23.8-inch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "941BB9E1-9900-4258-A05F-31844B581A5E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:proone_400_g6_20_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B11A0FB-F222-40E9-A70D-07E969B643A3", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:proone_400_g6_20_all-in-one_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "9133486D-201B-4655-85E7-983B22408635", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:proone_400_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C1353CD-E387-49CB-817D-FBBDC08DA499", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:proone_400_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "B82E6B60-301C-4290-88ED-6A2A28CA1CD6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "53F529E6-0D01-4351-ACB8-77C0EF338F90", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:proone_440_g4_23.8-inch_non-touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BEBA6E6-15F0-48B8-B7D8-12FE12FECFDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:proone_440_g5_23.8-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "53785B1C-A705-4D8F-BC2C-7F16C6E12303", "versionEndIncluding": "2.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:proone_440_g5_23.8-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9FEAE60-B7F7-4866-A8B4-4C750EFEE8A0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:proone_440_g6_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2770447B-C933-4384-9E62-2533EFECC33B", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:proone_440_g6_24_all-in-one_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A01F60F-D076-4598-8119-679C9DE32E39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA937A69-FF57-475A-8652-36D25E1E234D", "versionEndIncluding": "2.18.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:proone_600_g4_21.5-inch_touch_all-in-one_business_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB542C59-F3B5-42B8-892C-8FCAAEFF81E2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:proone_600_g5_21.5-in_all-in-one_business_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "70DC685B-8778-4D10-BE55-178A179299EC", "versionEndIncluding": "2.12.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:proone_600_g5_21.5-in_all-in-one_business_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "D55C0EC8-3FAD-45FA-9729-2C04BC14794A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:proone_600_g6_22_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6981E279-E529-432F-9BD6-E132571FC685", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:proone_600_g6_22_all-in-one_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "800F6A3F-3190-4386-B3DD-D2B3F4F0E995", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zhan_66_pro_g3_22_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ACF8FA2-2D5C-458D-8C31-FFFF98226677", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zhan_66_pro_g3_22_all-in-one_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E0E53DC-2F0E-49C4-98BE-1657B65D5F2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:zhan_66_pro_g3_24_all-in-one_pc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B952BD6-48F0-4890-8897-1738526A9792", "versionEndIncluding": "2.10.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:zhan_66_pro_g3_24_all-in-one_pc:-:*:*:*:*:*:*:*", "matchCriteriaId": "88559CE1-5B30-42AE-B136-89C11A0D36C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A potential vulnerability in AMD System Management Mode (SMM) interrupt handler may allow an attacker with high privileges to access the SMM resulting in arbitrary code execution which could be used by malicious actors to bypass security mechanisms provided in the UEFI firmware.\n\n" }, { "lang": "es", "value": "Una potencial vulnerabilidad en el manejador de interrupciones del Modo de Gesti\u00f3n del Sistema (SMM) de AMD puede permitir a un atacante con altos privilegios acceder al SMM resultando en la ejecuci\u00f3n de c\u00f3digo arbitrario que podr\u00eda ser utilizado por actores maliciosos para eludir los mecanismos de seguridad proporcionados en el firmware UEFI" } ], "id": "CVE-2021-39298", "lastModified": "2024-11-21T06:19:09.240", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-16T17:15:10.860", "references": [ { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027" }, { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.